Graph-DTP Graph-Based Algorithm for Solving Disjunctive Temporal Problems

合集下载

软件测试术语中英文对照

软件测试术语中英文对照
data corruption:数据污染
data definition C-use pair:数据定义C-use使用对
data definition P-use coverage:数据定义P-use覆盖
data definition P-use pair:数据定义P-use使用对
data definition:数据定义
data definition-use coverage:数据定义使用覆盖
data definition-use pair :数据定义使用对
data definition-use testing:数据定义使用测试
Check In :检入
Check Out :检出
Closeout : 收尾
code audit :代码审计
Code coverage : 代码覆盖
Code Inspection:代码检视
Core team : 核心小组
corrective maintenance:故障检修
correctness :正确性
coverage :覆盖率
coverage item:覆盖项
crash:崩溃
Beta testing : β测试
Black Box Testing:黑盒测试
Blocking bug : 阻碍性错误
Bottom-up testing : 自底向上测试
boundary value coverage:边界值覆盖
boundary value testing:边界值测试
Bug bash : 错误大扫除
bug fix : 错误修正
Bug report : 错误报告

模糊云资源调度的CMAPSO算法

模糊云资源调度的CMAPSO算法

模糊云资源调度的CMAPSO算法作者:李成严,宋月,马金涛来源:《哈尔滨理工大学学报》2022年第01期摘要:针对多目标云资源调度问题,以优化任务的总完成时间和总执行成本为目标,采用模糊数学的方法,建立了模糊云资源调度模型。

利用协方差矩阵能够解决非凸性问题的优势,采取协方差进化策略对种群进行初始化,并提出了一种混合智能优化算法CMAPSO算法(covariance matrix adaptation evolution strategy particle swarm optimization,CMAPSO ),并使用该算法对模糊云资源调度模型进行求解。

使用Cloudsim仿真平台随机生成云计算资源调度的数据,对CMAPSO算法进行测试,实验结果证明了CMAPSO算法对比PSO算法(particle wwarm optimization),在寻优能力方面提升28%,迭代次数相比提升20%,并且具有良好的负载均衡性能。

关键词:云计算;任务调度;粒子群算法; 协方差矩阵进化策略DOI:10.15938/j.jhust.2022.01.005中图分类号: TP399 文献标志码: A 文章编号: 1007-2683(2022)01-0031-09CMAPSO Algorithm for Fuzzy Cloud Resource SchedulingLI Chengyan,SONG Yue,MA Jintao(School of Computer Science and Technology, Harbin University of Science and Technology, Harbin 150080,China)Abstract:Aiming at the multiobjective cloud resource scheduling problem, with the goal of optimizing the total completion time and total execution cost of the task, a fuzzy cloud resource scheduling model is established using the method of fuzzy mathematics. Utilizing the advantage of the covariance matrix that can solve the nonconvexity problem, adopting the covariance evolution strategy to initialize the population, a hybrid intelligent optimization algorithm CMAPSO algorithm (covariance matrix adaptation evolution strategy particle swarm optimization,CMAPSO) is proposed to solve the fuzzy cloud resource scheduling model. The Cloudsim simulation platform was used to randomly generate cloud computing resource scheduling data, and the CMAPSO algorithm was tested. The experimental results showed that compared with the PSO algorithm (particle swarm optimization), the optimization capability of CMAPSO algorithm is increased by 28%, the number of iterations of CMAPSO algorithm is increased by 20%, and it has good load balancing performance.Keywords:cloud computing; task scheduling; particle swarm algorithm; covariance matrix adaptation evolution strategy0引言云計算是一种商业计算的模型和服务模式[1],而云计算资源调度的主要目的是将网络上的资源进行统一的管理和调式,再给予用户服务调用。

graph matching problem:图匹配问题

graph matching problem:图匹配问题


Biology data Documents Program flow
Image
2021/4/26
SOC@NUS
4
Thesis defense by Xiaoli Wang
Real application: social reading systems
Book duplicate detection problem
GED bound computation
GED computation
candidates
100,000
5% scan
100
index
answers 50
Inverted index based on the star decomposition The graph is decomposed into smaller stars Inverted index is designed to store the reference between graphs and stars Efficient CA-based search framework is proposed
2021/4/26
SOC@NUS
9
Thesis defense by Xiaoli Wang
Objectives
Building a 3-in-1 unified indexing system Design a unified and effective indexing mechanism Support similarity search on various complex structures
Waste resource to re-design various storage systems

软件测试中英文对照

软件测试中英文对照

Acceptance testing | 验收测试Acceptance Testing|可接受性测试Accessibility test |软体适用性测试actual outcome|实际结果Ad hoc testing | 随机测试Algorithm analysis |算法分析algorithm|算法Alpha testing | α测试analysis|分析anomaly|异常application software|应用软件Application under test (AUT)|所测试的应用程序Architecture |构架Artifact |工件ASQ|自动化软件质量(Automated Software Quality)Assertion checking |断言检查Association |关联Audit | 审计audit trail|审计跟踪Automated Testing|自动化测试Backus—Naur Form|BNF范式baseline|基线Basic Block|基本块basis test set|基本测试集Behaviour |行为Bench test | 基准测试benchmark|标杆/指标/基准Best practise |最佳实践Beta testing | β测试Black Box Testing|黑盒测试Blocking bug |阻碍性错误Bottom—up testing |自底向上测试boundary value coverage|边界值覆盖boundary value testing|边界值测试Boundary values |边界值Boundry Value Analysis|边界值分析branch condition combination coverage|分支条件组合覆盖branch condition combination testing|分支条件组合测试branch condition coverage|分支条件覆盖branch condition testing|分支条件测试branch condition|分支条件Branch coverage |分支覆盖branch outcome|分支结果branch point|分支点branch testing|分支测试branch|分支Breadth Testing|广度测试Brute force testing| 强力测试Buddy test | 合伙测试Buffer | 缓冲Bug |错误Bug bash | 错误大扫除bug fix | 错误修正Bug report |错误报告Bug tracking system|错误跟踪系统bug|缺陷Build | 工作版本(内部小版本)Build Verfication tests(BVTs)| 版本验证测试Build-in |内置Capability Maturity Model (CMM)| 能力成熟度模型Capability Maturity Model Integration (CMMI)|能力成熟度模型整合capture/playback tool|捕获/回放工具Capture/Replay Tool|捕获/回放工具CASE|计算机辅助软件工程(computer aided software engineering)CAST|计算机辅助测试cause—effect graph|因果图certification |证明change control|变更控制Change Management |变更管理Change Request |变更请求Character Set |字符集Check In |检入Check Out |检出Closeout |收尾code audit |代码审计Code coverage |代码覆盖Code Inspection|代码检视Code page | 代码页Code rule | 编码规范Code sytle |编码风格Code Walkthrough|代码走读code-based testing|基于代码的测试coding standards|编程规范Common sense | 常识Compatibility Testing|兼容性测试complete path testing |完全路径测试completeness|完整性complexity |复杂性Component testing |组件测试Component|组件computation data use|计算数据使用computer system security|计算机系统安全性Concurrency user |并发用户Condition coverage |条件覆盖condition coverage|条件覆盖condition outcome|条件结果condition|条件configuration control|配置控制Configuration item |配置项configuration management|配置管理Configuration testing | 配置测试conformance criterion| 一致性标准Conformance Testing|一致性测试consistency |一致性consistency checker|一致性检查器Control flow graph | 控制流程图control flow graph|控制流图control flow|控制流conversion testing|转换测试Core team |核心小组corrective maintenance|故障检修correctness |正确性coverage |覆盖率coverage item|覆盖项crash|崩溃criticality analysis|关键性分析criticality|关键性CRM(change request management)|变更需求管理Customer-focused mindset | 客户为中心的理念体系Cyclomatic complexity |圈复杂度data corruption|数据污染data definition C—use pair|数据定义C—use使用对data definition P-use coverage|数据定义P-use覆盖data definition P-use pair|数据定义P-use使用对data definition|数据定义data definition—use coverage|数据定义使用覆盖data definition-use pair |数据定义使用对data definition—use testing|数据定义使用测试data dictionary|数据字典Data Flow Analysis |数据流分析data flow analysis|数据流分析data flow coverage|数据流覆盖data flow diagram|数据流图data flow testing|数据流测试data integrity|数据完整性data use|数据使用data validation|数据确认dead code|死代码Debug |调试Debugging|调试Decision condition|判定条件Decision coverage | 判定覆盖decision coverage|判定覆盖decision outcome|判定结果decision table|判定表decision|判定Defect | 缺陷defect density |缺陷密度Defect Tracking |缺陷跟踪Deployment |部署Depth Testing|深度测试design for sustainability |可延续性的设计design of experiments|实验设计design—based testing|基于设计的测试Desk checking |桌前检查desk checking|桌面检查Determine Usage Model | 确定应用模型Determine Potential Risks | 确定潜在风险diagnostic|诊断DIF(decimation in frequency)|按频率抽取dirty testing|肮脏测试disaster recovery|灾难恢复DIT (decimation in time)| 按时间抽取documentation testing |文档测试domain testing|域测试domain|域DTP DETAIL TEST PLAN详细确认测试计划Dynamic analysis |动态分析dynamic analysis|动态分析Dynamic Testing|动态测试embedded software|嵌入式软件emulator|仿真End—to—End testing|端到端测试Enhanced Request |增强请求entity relationship diagram|实体关系图Encryption Source Code Base|加密算法源代码库Entry criteria | 准入条件entry point |入口点Envisioning Phase |构想阶段Equivalence class |等价类Equivalence Class|等价类equivalence partition coverage|等价划分覆盖Equivalence partition testing |等价划分测试equivalence partition testing|参考等价划分测试equivalence partition testing|等价划分测试Equivalence Partitioning|等价划分Error |错误Error guessing |错误猜测error seeding|错误播种/错误插值error|错误Event-driven | 事件驱动Exception handlers |异常处理器exception|异常/例外executable statement|可执行语句Exhaustive Testing|穷尽测试exit point|出口点expected outcome|期望结果Exploratory testing |探索性测试Failure | 失效Fault |故障fault|故障feasible path|可达路径feature testing|特性测试Field testing |现场测试FMEA|失效模型效果分析(Failure Modes and Effects Analysis)FMECA|失效模型效果关键性分析(Failure Modes and Effects Criticality Analysis) Framework |框架FTA|故障树分析(Fault Tree Analysis)functional decomposition|功能分解Functional Specification |功能规格说明书Functional testing |功能测试Functional Testing|功能测试G11N(Globalization) | 全球化Gap analysis |差距分析Garbage characters | 乱码字符glass box testing|玻璃盒测试Glass—box testing |白箱测试或白盒测试Glossary | 术语表GUI(Graphical User Interface)| 图形用户界面Hard—coding | 硬编码Hotfix | 热补丁I18N(Internationalization)| 国际化Identify Exploratory Tests –识别探索性测试IEEE|美国电子与电器工程师学会(Institute of Electrical and Electronic Engineers)Incident 事故Incremental testing | 渐增测试incremental testing|渐增测试infeasible path|不可达路径input domain|输入域Inspection |审查inspection|检视installability testing|可安装性测试Installing testing | 安装测试instrumentation|插装instrumenter|插装器Integration |集成Integration testing |集成测试interface | 接口interface analysis|接口分析interface testing|接口测试interface|接口invalid inputs|无效输入isolation testing|孤立测试Issue |问题Iteration | 迭代Iterative development|迭代开发job control language|工作控制语言Job|工作Key concepts |关键概念Key Process Area | 关键过程区域Keyword driven testing |关键字驱动测试Kick—off meeting |动会议L10N(Localization) |本地化Lag time | 延迟时间LCSAJ|线性代码顺序和跳转(Linear Code Sequence And Jump)LCSAJ coverage|LCSAJ覆盖LCSAJ testing|LCSAJ测试Lead time |前置时间Load testing | 负载测试Load Testing|负载测试Localizability testing| 本地化能力测试Localization testing |本地化测试logic analysis|逻辑分析logic—coverage testing|逻辑覆盖测试Maintainability |可维护性maintainability testing|可维护性测试Maintenance |维护Master project schedule |总体项目方案Measurement |度量Memory leak | 内存泄漏Migration testing |迁移测试Milestone |里程碑Mock up |模型,原型modified condition/decision coverage|修改条件/判定覆盖modified condition/decision testing |修改条件/判定测试modular decomposition|参考模块分解Module testing |模块测试Monkey testing | 跳跃式测试Monkey Testing|跳跃式测试mouse over|鼠标在对象之上mouse leave|鼠标离开对象MTBF|平均失效间隔实际(mean time between failures)MTP MAIN TEST PLAN主确认计划MTTF|平均失效时间 (mean time to failure)MTTR|平均修复时间(mean time to repair)multiple condition coverage|多条件覆盖mutation analysis|变体分析N/A(Not applicable) | 不适用的Negative Testing |逆向测试, 反向测试, 负面测试negative testing|参考负面测试Negative Testing|逆向测试/反向测试/负面测试off by one|缓冲溢出错误non—functional requirements testing|非功能需求测试nominal load|额定负载N-switch coverage|N切换覆盖N-switch testing|N切换测试N-transitions|N转换Off—the—shelf software | 套装软件operational testing|可操作性测试output domain|输出域paper audit|书面审计Pair Programming |成对编程partition testing|分类测试Path coverage | 路径覆盖path coverage|路径覆盖path sensitizing|路径敏感性path testing|路径测试path|路径Peer review |同行评审Performance | 性能Performance indicator|性能(绩效)指标Performance testing |性能测试Pilot |试验Pilot testing |引导测试Portability |可移植性portability testing|可移植性测试Positive testing |正向测试Postcondition |后置条件Precondition | 前提条件precondition|预置条件predicate data use|谓词数据使用predicate|谓词Priority | 优先权program instrumenter|程序插装progressive testing|递进测试Prototype |原型Pseudo code |伪代码pseudo-localization testing|伪本地化测试pseudo—random|伪随机QC|质量控制(quality control)Quality assurance(QA)| 质量保证Quality Control(QC) |质量控制Race Condition|竞争状态Rational Unified Process(以下简称RUP)|瑞理统一工艺Recovery testing |恢复测试recovery testing|恢复性测试Refactoring |重构regression analysis and testing|回归分析和测试Regression testing |回归测试Release |发布Release note |版本说明release|发布Reliability |可靠性reliability assessment|可靠性评价reliability|可靠性Requirements management tool|需求管理工具Requirements—based testing |基于需求的测试Return of Investment(ROI)|投资回报率review|评审Risk assessment |风险评估risk|风险Robustness | 强健性Root Cause Analysis(RCA)| 根本原因分析safety critical|严格的安全性safety|(生命)安全性Sanity testing | 健全测试Sanity Testing|理智测试Schema Repository | 模式库Screen shot |抓屏、截图SDP|软件开发计划(software development plan)Security testing | 安全性测试security testing|安全性测试security.|(信息)安全性serviceability testing|可服务性测试Severity | 严重性Shipment |发布simple subpath|简单子路径Simulation |模拟Simulator | 模拟器SLA(Service level agreement)|服务级别协议SLA|服务级别协议(service level agreement)Smoke testing |冒烟测试Software development plan(SDP)| 软件开发计划Software development process|软件开发过程software development process|软件开发过程software diversity|软件多样性software element|软件元素software engineering environment|软件工程环境software engineering|软件工程Software life cycle | 软件生命周期source code|源代码source statement|源语句Specification |规格说明书specified input|指定的输入spiral model |螺旋模型SQAP SOFTWARE QUALITY ASSURENCE PLAN 软件质量保证计划SQL|结构化查询语句(structured query language)Staged Delivery|分布交付方法state diagram|状态图state transition testing |状态转换测试state transition|状态转换state|状态Statement coverage |语句覆盖statement testing|语句测试statement|语句Static Analysis|静态分析Static Analyzer|静态分析器Static Testing|静态测试statistical testing|统计测试Stepwise refinement | 逐步优化storage testing|存储测试Stress Testing |压力测试structural coverage|结构化覆盖structural test case design|结构化测试用例设计structural testing|结构化测试structured basis testing|结构化的基础测试structured design|结构化设计structured programming|结构化编程structured walkthrough|结构化走读stub|桩sub-area|子域Summary| 总结SVVP SOFTWARE Vevification&Validation PLAN| 软件验证和确认计划symbolic evaluation|符号评价symbolic execution|参考符号执行symbolic execution|符号执行symbolic trace|符号轨迹Synchronization | 同步Syntax testing |语法分析system analysis|系统分析System design | 系统设计system integration|系统集成System Testing | 系统测试TC TEST CASE 测试用例TCS TEST CASE SPECIFICATION 测试用例规格说明TDS TEST DESIGN SPECIFICATION 测试设计规格说明书technical requirements testing|技术需求测试Test |测试test automation|测试自动化Test case | 测试用例test case design technique|测试用例设计技术test case suite|测试用例套test comparator|测试比较器test completion criterion|测试完成标准test coverage|测试覆盖Test design | 测试设计Test driver |测试驱动test environment|测试环境test execution technique|测试执行技术test execution|测试执行test generator|测试生成器test harness|测试用具Test infrastructure | 测试基础建设test log|测试日志test measurement technique|测试度量技术Test Metrics |测试度量test procedure|测试规程test records|测试记录test report|测试报告Test scenario | 测试场景Test Script|测试脚本Test Specification|测试规格Test strategy | 测试策略test suite|测试套Test target | 测试目标Test ware | 测试工具Testability | 可测试性testability|可测试性Testing bed | 测试平台Testing coverage |测试覆盖Testing environment | 测试环境Testing item |测试项Testing plan |测试计划Testing procedure | 测试过程Thread testing |线程测试time sharing|时间共享time—boxed |固定时间TIR test incident report 测试事故报告ToolTip|控件提示或说明top—down testing|自顶向下测试TPS TEST PEOCESS SPECIFICATION 测试步骤规格说明Traceability | 可跟踪性traceability analysis|跟踪性分析traceability matrix|跟踪矩阵Trade—off | 平衡transaction|事务/处理transaction volume|交易量transform analysis|事务分析trojan horse|特洛伊木马truth table|真值表TST TEST SUMMARY REPORT 测试总结报告Tune System | 调试系统TW TEST WARE |测试件Unit Testing |单元测试Usability Testing|可用性测试Usage scenario | 使用场景User acceptance Test |用户验收测试User database |用户数据库User interface(UI) | 用户界面User profile | 用户信息User scenario |用户场景V&V (Verification & Validation) | 验证&确认validation |确认verification |验证version |版本Virtual user | 虚拟用户volume testing|容量测试VSS(visual source safe)|VTP Verification TEST PLAN验证测试计划VTR Verification TEST REPORT验证测试报告Walkthrough | 走读Waterfall model | 瀑布模型Web testing | 网站测试White box testing |白盒测试Work breakdown structure (WBS) |任务分解结构Zero bug bounce (ZBB)|零错误反弹。

软件检验中英文对照

软件检验中英文对照

Acceptance testing | 验收测试Acceptance Testing|可接受性测试Accessibility test | 软体适用性测试actual outcome|实际结果Ad hoc testing | 随机测试Algorithm analysis | 算法分析algorithm|算法Alpha testing | α测试analysis|分析anomaly|异常application software|应用软件Application under test (AUT) | 所测试的应用程序Architecture | 构架Artifact | 工件ASQ|自动化软件质量(Automated Software Quality)Assertion checking | 断言检查Association | 关联Audit | 审计audit trail|审计跟踪Automated Testing|自动化测试Backus-Naur Form|BNF范式baseline|基线Basic Block|基本块basis test set|基本测试集Behaviour | 行为Bench test | 基准测试benchmark|标杆/指标/基准Best practise | 最佳实践Beta testing | β测试Black Box Testing|黑盒测试Blocking bug | 阻碍性错误Bottom-up testing | 自底向上测试boundary value coverage|边界值覆盖boundary value testing|边界值测试Boundary values | 边界值Boundry Value Analysis|边界值分析branch condition combination coverage|分支条件组合覆盖branch condition combination testing|分支条件组合测试branch condition coverage|分支条件覆盖branch condition testing|分支条件测试branch condition|分支条件Branch coverage | 分支覆盖branch outcome|分支结果branch point|分支点branch testing|分支测试branch|分支Breadth Testing|广度测试Brute force testing| 强力测试Buddy test | 合伙测试Buffer | 缓冲Bug | 错误Bug bash | 错误大扫除bug fix | 错误修正Bug report | 错误报告Bug tracking system| 错误跟踪系统bug|缺陷Build | 工作版本(内部小版本)Build Verfication tests(BVTs)| 版本验证测试Build-in | 内置Capability Maturity Model (CMM)| 能力成熟度模型Capability Maturity Model Integration (CMMI)| 能力成熟度模型整合capture/playback tool|捕获/回放工具Capture/Replay Tool|捕获/回放工具CASE|计算机辅助软件工程(computer aided software engineering)CAST|计算机辅助测试cause-effect graph|因果图certification |证明change control|变更控制Change Management |变更管理Change Request |变更请求Character Set | 字符集Check In |检入Check Out |检出Closeout | 收尾code audit |代码审计Code coverage | 代码覆盖Code Inspection|代码检视Code page | 代码页Code rule | 编码规范Code sytle | 编码风格Code Walkthrough|代码走读code-based testing|基于代码的测试coding standards|编程规范Common sense | 常识Compatibility Testing|兼容性测试complete path testing |完全路径测试completeness|完整性complexity |复杂性Component testing | 组件测试Component|组件computation data use|计算数据使用computer system security|计算机系统安全性Concurrency user | 并发用户Condition coverage | 条件覆盖condition coverage|条件覆盖condition outcome|条件结果condition|条件configuration control|配置控制Configuration item | 配置项configuration management|配置管理Configuration testing | 配置测试conformance criterion| 一致性标准Conformance Testing| 一致性测试consistency | 一致性consistency checker| 一致性检查器Control flow graph | 控制流程图control flow graph|控制流图control flow|控制流conversion testing|转换测试Core team | 核心小组corrective maintenance|故障检修correctness |正确性coverage |覆盖率coverage item|覆盖项crash|崩溃criticality analysis|关键性分析criticality|关键性CRM(change request management)| 变更需求管理Customer-focused mindset | 客户为中心的理念体系Cyclomatic complexity | 圈复杂度data corruption|数据污染data definition C-use pair|数据定义C-use使用对data definition P-use coverage|数据定义P-use覆盖data definition P-use pair|数据定义P-use使用对data definition|数据定义data definition-use coverage|数据定义使用覆盖data definition-use pair |数据定义使用对data definition-use testing|数据定义使用测试data dictionary|数据字典Data Flow Analysis | 数据流分析data flow analysis|数据流分析data flow coverage|数据流覆盖data flow diagram|数据流图data flow testing|数据流测试data integrity|数据完整性data use|数据使用data validation|数据确认dead code|死代码Debug | 调试Debugging|调试Decision condition|判定条件Decision coverage | 判定覆盖decision coverage|判定覆盖decision outcome|判定结果decision table|判定表decision|判定Defect | 缺陷defect density | 缺陷密度Defect Tracking |缺陷跟踪Deployment | 部署Depth Testing|深度测试design for sustainability |可延续性的设计design of experiments|实验设计design-based testing|基于设计的测试Desk checking | 桌前检查desk checking|桌面检查Determine Usage Model | 确定应用模型Determine Potential Risks | 确定潜在风险diagnostic|诊断DIF(decimation in frequency) | 按频率抽取dirty testing|肮脏测试disaster recovery|灾难恢复DIT (decimation in time)| 按时间抽取documentation testing |文档测试domain testing|域测试domain|域DTP DETAIL TEST PLAN详细确认测试计划Dynamic analysis | 动态分析dynamic analysis|动态分析Dynamic Testing|动态测试embedded software|嵌入式软件emulator|仿真End-to-End testing|端到端测试Enhanced Request |增强请求entity relationship diagram|实体关系图Encryption Source Code Base| 加密算法源代码库Entry criteria | 准入条件entry point |入口点Envisioning Phase | 构想阶段Equivalence class | 等价类Equivalence Class|等价类equivalence partition coverage|等价划分覆盖Equivalence partition testing | 等价划分测试equivalence partition testing|参考等价划分测试equivalence partition testing|等价划分测试Equivalence Partitioning|等价划分Error | 错误Error guessing | 错误猜测error seeding|错误播种/错误插值error|错误Event-driven | 事件驱动Exception handlers | 异常处理器exception|异常/例外executable statement|可执行语句Exhaustive Testing|穷尽测试exit point|出口点expected outcome|期望结果Exploratory testing | 探索性测试Failure | 失效Fault | 故障fault|故障feasible path|可达路径feature testing|特性测试Field testing | 现场测试FMEA|失效模型效果分析(Failure Modes and Effects Analysis)FMECA|失效模型效果关键性分析(Failure Modes and Effects Criticality Analysis)Framework | 框架FTA|故障树分析(Fault Tree Analysis)functional decomposition|功能分解Functional Specification |功能规格说明书Functional testing | 功能测试Functional Testing|功能测试G11N(Globalization) | 全球化Gap analysis | 差距分析Garbage characters | 乱码字符glass box testing|玻璃盒测试Glass-box testing | 白箱测试或白盒测试Glossary | 术语表GUI(Graphical User Interface)| 图形用户界面Hard-coding | 硬编码Hotfix | 热补丁I18N(Internationalization)| 国际化Identify Exploratory Tests –识别探索性测试IEEE|美国电子与电器工程师学会(Institute of Electrical and Electronic Engineers)Incident 事故Incremental testing | 渐增测试incremental testing|渐增测试infeasible path|不可达路径input domain|输入域Inspection | 审查inspection|检视installability testing|可安装性测试Installing testing | 安装测试instrumentation|插装instrumenter|插装器Integration |集成Integration testing | 集成测试interface | 接口interface analysis|接口分析interface testing|接口测试interface|接口invalid inputs|无效输入isolation testing|孤立测试Issue | 问题Iteration | 迭代Iterative development| 迭代开发job control language|工作控制语言Job|工作Key concepts | 关键概念Key Process Area | 关键过程区域Keyword driven testing | 关键字驱动测试Kick-off meeting | 动会议L10N(Localization) | 本地化Lag time | 延迟时间LCSAJ|线性代码顺序和跳转(Linear Code Sequence And Jump)LCSAJ coverage|LCSAJ覆盖LCSAJ testing|LCSAJ测试Lead time | 前置时间Load testing | 负载测试Load Testing|负载测试Localizability testing| 本地化能力测试Localization testing | 本地化测试logic analysis|逻辑分析logic-coverage testing|逻辑覆盖测试Maintainability | 可维护性maintainability testing|可维护性测试Maintenance | 维护Master project schedule |总体项目方案Measurement | 度量Memory leak | 内存泄漏Migration testing | 迁移测试Milestone | 里程碑Mock up | 模型,原型modified condition/decision coverage|修改条件/判定覆盖modified condition/decision testing |修改条件/判定测试modular decomposition|参考模块分解Module testing | 模块测试Monkey testing | 跳跃式测试Monkey Testing|跳跃式测试mouse over|鼠标在对象之上mouse leave|鼠标离开对象MTBF|平均失效间隔实际(mean time between failures)MTP MAIN TEST PLAN主确认计划MTTF|平均失效时间(mean time to failure)MTTR|平均修复时间(mean time to repair)multiple condition coverage|多条件覆盖mutation analysis|变体分析N/A(Not applicable) | 不适用的Negative Testing | 逆向测试, 反向测试, 负面测试negative testing|参考负面测试Negative Testing|逆向测试/反向测试/负面测试off by one|缓冲溢出错误non-functional requirements testing|非功能需求测试nominal load|额定负载N-switch coverage|N切换覆盖N-switch testing|N切换测试N-transitions|N转换Off-the-shelf software | 套装软件operational testing|可操作性测试output domain|输出域paper audit|书面审计Pair Programming | 成对编程partition testing|分类测试Path coverage | 路径覆盖path coverage|路径覆盖path sensitizing|路径敏感性path testing|路径测试path|路径Peer review | 同行评审Performance | 性能Performance indicator| 性能(绩效)指标Performance testing | 性能测试Pilot | 试验Pilot testing | 引导测试Portability | 可移植性portability testing|可移植性测试Positive testing | 正向测试Postcondition | 后置条件Precondition | 前提条件precondition|预置条件predicate data use|谓词数据使用predicate|谓词Priority | 优先权program instrumenter|程序插装progressive testing|递进测试Prototype | 原型Pseudo code | 伪代码pseudo-localization testing|伪本地化测试pseudo-random|伪随机QC|质量控制(quality control)Quality assurance(QA)| 质量保证Quality Control(QC) | 质量控制Race Condition|竞争状态Rational Unified Process(以下简称RUP)|瑞理统一工艺recovery testing|恢复性测试Refactoring | 重构regression analysis and testing|回归分析和测试Regression testing | 回归测试Release | 发布Release note | 版本说明release|发布Reliability | 可靠性reliability assessment|可靠性评价reliability|可靠性Requirements management tool| 需求管理工具Requirements-based testing | 基于需求的测试Return of Investment(ROI)| 投资回报率review|评审Risk assessment | 风险评估risk|风险Robustness | 强健性Root Cause Analysis(RCA)| 根本原因分析safety critical|严格的安全性safety|(生命)安全性Sanity Testing|理智测试Schema Repository | 模式库Screen shot | 抓屏、截图SDP|软件开发计划(software development plan)Security testing | 安全性测试security testing|安全性测试security.|(信息)安全性serviceability testing|可服务性测试Severity | 严重性Shipment | 发布simple subpath|简单子路径Simulation | 模拟Simulator | 模拟器SLA(Service level agreement)| 服务级别协议SLA|服务级别协议(service level agreement)Smoke testing | 冒烟测试Software development plan(SDP)| 软件开发计划Software development process| 软件开发过程software development process|软件开发过程software diversity|软件多样性software element|软件元素software engineering environment|软件工程环境software engineering|软件工程Software life cycle | 软件生命周期source code|源代码source statement|源语句Specification | 规格说明书specified input|指定的输入spiral model |螺旋模型SQAP SOFTWARE QUALITY ASSURENCE PLAN 软件质量保证计划SQL|结构化查询语句(structured query language)Staged Delivery|分布交付方法state diagram|状态图state transition testing |状态转换测试state transition|状态转换state|状态Statement coverage | 语句覆盖statement testing|语句测试statement|语句Static Analysis|静态分析Static Analyzer|静态分析器Static Testing|静态测试statistical testing|统计测试Stepwise refinement | 逐步优化storage testing|存储测试Stress Testing | 压力测试structural coverage|结构化覆盖structural test case design|结构化测试用例设计structural testing|结构化测试structured basis testing|结构化的基础测试structured design|结构化设计structured programming|结构化编程structured walkthrough|结构化走读stub|桩sub-area|子域Summary| 总结SVVP SOFTWARE Vevification&Validation PLAN| 软件验证和确认计划symbolic evaluation|符号评价symbolic execution|参考符号执行symbolic execution|符号执行symbolic trace|符号轨迹Synchronization | 同步Syntax testing | 语法分析system analysis|系统分析System design | 系统设计system integration|系统集成System Testing | 系统测试TC TEST CASE 测试用例TCS TEST CASE SPECIFICATION 测试用例规格说明TDS TEST DESIGN SPECIFICATION 测试设计规格说明书technical requirements testing|技术需求测试Test | 测试test automation|测试自动化Test case | 测试用例test case design technique|测试用例设计技术test case suite|测试用例套test comparator|测试比较器test completion criterion|测试完成标准test coverage|测试覆盖Test design | 测试设计Test driver | 测试驱动test environment|测试环境test execution technique|测试执行技术test execution|测试执行test generator|测试生成器test harness|测试用具Test infrastructure | 测试基础建设test log|测试日志test measurement technique|测试度量技术Test Metrics |测试度量test procedure|测试规程test records|测试记录test report|测试报告Test scenario | 测试场景Test Script|测试脚本Test Specification|测试规格Test strategy | 测试策略test suite|测试套Test target | 测试目标Test ware | 测试工具Testability | 可测试性testability|可测试性Testing bed | 测试平台Testing coverage | 测试覆盖Testing environment | 测试环境Testing item | 测试项Testing plan | 测试计划Testing procedure | 测试过程Thread testing | 线程测试time sharing|时间共享time-boxed | 固定时间TIR test incident report 测试事故报告ToolTip|控件提示或说明top-down testing|自顶向下测试TPS TEST PEOCESS SPECIFICATION 测试步骤规格说明Traceability | 可跟踪性traceability analysis|跟踪性分析traceability matrix|跟踪矩阵Trade-off | 平衡transaction|事务/处理transaction volume|交易量transform analysis|事务分析trojan horse|特洛伊木马truth table|真值表TST TEST SUMMARY REPORT 测试总结报告Tune System | 调试系统TW TEST WARE |测试件Unit Testing |单元测试Usability Testing|可用性测试Usage scenario | 使用场景User acceptance Test | 用户验收测试User database |用户数据库User interface(UI) | 用户界面User profile | 用户信息User scenario | 用户场景V&V (Verification & Validation) | 验证&确认validation |确认verification |验证version |版本Virtual user | 虚拟用户volume testing|容量测试VSS(visual source safe) |VTP Verification TEST PLAN验证测试计划VTR Verification TEST REPORT验证测试报告Walkthrough | 走读Waterfall model | 瀑布模型Web testing | 网站测试White box testing | 白盒测试Work breakdown structure (WBS) | 任务分解结构Zero bug bounce (ZBB) | 零错误反弹。

电脑与信息技术英语翻译常用专业词汇

电脑与信息技术英语翻译常用专业词汇

电脑与信息技术英语翻译常用专业词汇AAAIMS(An Analytical Information Management System)分析信息管理系统Abacus 算盘Access security 存取安全Access time 存取时间Active 有源的Ada programming language Ada 程序设计语言Adapter 适配器Adapter card 转接卡Add-on 外接式附件Address 地址ADSL(Asymmetric Digital Subscriber Line) 非对称数字客户线路After-image record 残留影像记录Algorithm 算法Alpha testing ɑ测试3Alteration switch 变换开关ALU(Arithmetic/Logic Unit)运算器Amplitude 幅度Analog data 模拟数据Analog cellular 模拟移动电话Analog signal 模拟信号Analysis block 分析块Animation 动画制作ANSL(American National Standards Label)美国国家标准标号Answerback memory 应答存储器Anti-noise coding 反噪声编码Antivirus software 反病毒软件APL(A Programming Language) APL 语言Application development cycle 应用开发周期Application program 应用程序4Application software 应用软件Arithmetic operation 算术运算ARP(Automatic Receive Program)自动同意程序Artificial network 仿真网络ASCII(American standard Code for Information Interchange)美国信息交换用标准代码Assembler 汇编程序Assembly language 汇编语言Asynchronous 异步的Asynchronous transmission 异步传输ATM(Asynchronous Transfer Mode) 异步传输模式ATM(Automated Teller Machine)自动出纳机Attribute 属性Auctions on the web 网上拍卖Audio board 声板5Audio file 声音文件Audio input device 声音输入装置Audio-player 播放Audit program 审查程序Auditing system 审查系统Authoring system 写作系统6BBackbone system 主干系统Backup file 备份文件Backward compatibility 反向兼容性Backward recovery 向后恢复Band printer 带式打印机Bandwidth 带宽Bandwidth limitation 带宽限制Bar code 条形码Bar-code reader 条形码读出器Basic exchange format 基本交换格式BASIC programming language BASIC 程序设计语言Batch processing 批处理Beeper 传呼机7Be ta testing β测试Binary digit 二进制数字Binary file 二进制文件Binary number system 二进制数字系统Binary system 二进制BIOS(Basic Input/Output System)基本输入/输出系统Bit 量,位Bit(binary digit)位,二进制位,比特Bit-mapped display screen 位映像显示器Block check 块检验Blocking software 封锁软件Bookmark 书签Bootleg version 盗版BPS(Business Professional System) 商业专用系统Bridge 网桥8Broadcast image 广播图象Browser 浏览程序Building blocks 组件Built-in function 内部功能Bus 总线Bus network 总线网络Bus slot 总线槽Business terminal equipment 商务终端设备Button 按扭Byte 字节,位组9CC programming language C 程序设计语言C++ programming language C++程序设计语言Cable length 电缆长度Cable modem 电缆调制解调器Cache memory 超高速缓冲存储器CAD(Computer-Aided Design) 计算机辅助设计CADD(Compute-Aided Design and Drafting) 计算机辅助设计与制图Call-back system 回叫系统CAM(Computer-Aided Manufacturing) 计算机辅助生产Capacity 容量Carrier wave 载波Cartridge tape 盒式磁带CASE(Computer-Aided Software Engineering) 计算机辅助软件工程10CBT(Computer-Based Training) 利用计算机的训练CCD(Charge Coupled Device)电荷藕合器件CD writer 刻录机CDC(Code-Directing Character) 代码引导字符CDP(Certified Data Processor)合格数据处理程序Cell 单元,细胞,信元Cell address 单元地址Cell pointer 单元指示器CEO(Chip Enable Output) 芯片启动输出CERT(Character Error Rate Tester) 字符出错率测试程序Chain printer 链式打印机Channel command 通道命令Character 字符Character-recognition 字符识别Chat room 聊天室11Check bit 校验位,检验位Child record 子记录Chip 芯片,晶片Circuit switching 电路转接,线路交换CIS(Communication Information System) 通信信息(情报)系统Clear entry 消除输入Click 点击Client 客户,委托程序,委托进程,客户机Client-server 客户服务器Clipboard 剪贴板Clouds 云Cluster 簇,束,线束,群集Coaxial tree network 同轴树状网络COBOL programming language COBOL 程序设计语言Coding 编码,编程序12Collision 冲突Color display screen 彩色显示屏Communication 通信Communication parties 传输单元Communications channel 通信信道Communications controller 通信操纵器Communications hardware 通信硬件Communications network 通信网络Communications satellites 通信卫星Communications server 通信服务器Communications service 通信业务Communications software 通信软件Communications technology 通信技术Compatibility 兼容性,一致性,互换性Compiler 编译程序13Component 分量,成分,元件,组件,部件Compression 压缩Computer 计算机Computer-based information system 计算机信息系统Computer crime 计算机犯罪Computer industry 计算机行业Computer literacy 计算机扫盲Computer online service 计算机联机服务Computer professional 计算机专业人员Computer programmer 计算机程序设计员Concentration 集中Concentrator 集中器,集线器Concurrent-use license 并行使用许可证Connection 连接Connectivity 连通性,连接性14Connectivity diagram 连通图表Contact 接触点Control structure 操纵结构Control unit 操纵器,操纵部件Controller card 操纵器插件Coprocessor 协同处理程序,协同处理机Copy command 复制命令Copyright 版权Copyright protection 版权保护Counterfeit software 盗版软件Courseware 课件CPU(Central Processing Unit) 中央处理机Cracker 黑客CRT(Cathode Ray Tube) 阴极射线管CTS(Clear To Send) 清除发送15Cursor 光标Cursor-movement key 光标移动键Custom software 客户软件Cut command 剪切命令Cyberculture 计算机文化,操纵论优化Cybernation 计算机操纵化16DDaisy chain 菊链DAT(Data Acquisition Test) 数据采集测试Data access method 数据存取法Data acquisition 数据采集Data compression 数据压缩Data dictionary 数据字典Data file 数据文件Data flow diagram 数据流程图Data integrity 数据完整性Data manipulation language 数据操纵语言Data mining 数据开采Data recovery 数据恢复Data redundancy 数据冗余Data storage hierarchy 数据存储层次17Data transmission 数据传输Data transmission factor 数据传输系数Data warehouse 数据仓库Database 数据库Database server 数据库服务器Database software 数据库软件DBA(Data Base Administrator) 数据库管理程序DBMS(Data Base Management System) 数据库管理系统Debugging 调试Decision making system 判定系统,决策系统Decision table 判定表Dedicated computer 专用计算机Default value 缺省值,系统设定值Delete 删除Democratic network 共同操纵网络18Design 设计Desk checking 桌面检验Desktop accessory 桌面附件Desktop publication system 桌面出版系统Developing information system 信息开发系统Dialog box 对话框Dial-up connection 拨号上网Dial-up Internet communication 拨号网间通信Digital 数码的Digital camera 数码照相机Digital cellular phone 数字移动电话Digital signal 数字信号Digital signal processor 数字信号处理器Digital signature 数字签名Digitized speech 数字化语音19DIMS(Data Information and Manufacturing system) 数据信息与制造系统Direct access storage 直接存取存储器,直接访问存储器Direct file organization 直接文件组织Direct implementation 直接实现Direct synchronous multiplexing 直接同步复用Directory 目录,号码表Disk 磁盘Disk drive 磁盘驱动器Diskette 软磁盘,软盘Display 显示Display screen 显示屏幕Disrupt 使混乱,破坏,分裂,瓦解Distance learning 远程学习Distributed database 分布式数据库Disturbance 干扰20DM(Data Memory) 数据存储器DNS(Domain Naming System) 域命名系统Document 文件,资料,文献,文卷Document file 资料文件Documentation 文件编制,资料,文档DOS(Disk Operating System) 磁盘操作系统Dot 点Dot-matrix printer 点阵打印机Download 下载Downsizing 规模缩小化Downward compatibility 向下兼容性Draft-quality 粗劣的印刷质量,草稿字体印刷质量DRAM(Dynamic Random Access Memory) 动态随机存取存储器Drawing program 绘图程序Driver 驱动器21Drum printer 鼓式打印机Drum scanner 鼓形扫描器DSS(Decision Support System) 决策支援系统DTP(Data Transmission Protocol) 数据传送协议Dumb terminal 哑终端,简易终端DVP(Data Validation Program) 数据验证程序Dynamic linking 动态链接22EEBCDIC(Extended Binary Coded Decimal Interchange) 扩充的二-十进制交换码E-cash 电子货币E-commerce 电子商务EDI(Electronic Data Interchange) 电子数据交换EEPROM(Electrically Erasable Read Only Memory) 电可擦只读存储器EIC(External Interface Control) 外部借口操纵EIS(External Interrupt Support) 外部中断支援Electroluminescent display 电致发光显示屏Electromagnetic spectrum 电磁光谱Electronic conference 电子会议Electronic image 电子图象Electronic network 电子网络23Electronic secretary 电子秘书Electronic ticketing machine 电子售票机Electronic tutor 电子教学装置Electrostatic plotter 静电绘图机Elementary field 基本字段ELF(Extensible Language Facility) 可扩充的语言功能E-mail 电子邮件Embedded computer 嵌入式计算机Emulation 仿真,仿效Encapsulation 封闭,封装,密封Encryption 加密,编密码End-to-end delay 端到端的时延End-to-end digital connectivity 端到端的数字连接End-user 终端用户ENIAC(Electronic Numerical Integrator and Calculator) 电子数字积分24器与计算器Enter key 输入键EPL(Encoder Programming Language) 编码器程序设计语言EPROM(Erasable Programmable Read Only Memory) 可擦可编程只读存储器EPSS(Error Processing Sub-system) 错误处理子系统Ergonomics 人类工程学Error correction 纠错法ESS(Electronic Switching System) 电子交换系统Evaluation system 评价系统Even parity 偶数奇偶校验Exchange service 交换业务Executable 可执行文件Execution cycle 执行周期Execution program 执行程序Expansion bus 扩展总线25Expansion card 扩充插件卡Expansion slot 扩展槽Expert system 专家系统External hard disk drive 外部硬盘驱动器External modem 外部调制解调器26FFAT(File Allocation Table) 文件分配表Fault freedom 容错性能Fault tolerant system 容错系统Fax 传真Fax machine 传真机FCB(File Control Block) 文件操纵块Feasibility study 可行性研究,可能性研究FEC(Forward Error Correction) 向前纠错Fiber-optic cable 光缆Field 字段,场,域Field protect 字段保护Fifth-generation programming language 第五代程序设计语言File 文件27File extension 文件扩充File management system 文件管理系统File name 文件名File server 文件服务程序File virus 文件病毒Filter 过滤,滤波Financial planning system 财务规划系统Find command 查找命令Finder 寻找程序,定位程序,录像器Fingerprint security system 指纹安全系统Firewall 防火墙Firmware 固件Fixed disk drive 固定磁盘驱动器Flatbed plotter 平板绘图仪Flatbed scanner 平板扫描仪28Flat-panel display 平面显示器Flat-panel technique 平面技术Flexible telecommunication networking 灵活的通信联网Floppy disk 软磁盘FLOPS(Floating-point Operations Per Second) 每秒浮点运算次数Flowchart 流程图Font 字型,字体Format selection 格式选择Formatting 格式化,格式编排Formula 公式FORTH programming language FORTH 程序设计语言Forward recovery 正向恢复Fourth-generation programming language 第四代程序设计语言Fragmenting 分割29Frame grabber 帧同意器,帧捕获器Free ware 免费软件Frequency 频率Front-end processor 前端处理机FTP(File Transfer Protocol)文件传送协议Full-duplex 全双工Function 功能,函数,作用Function key 功能键Fuzzy logic 模糊逻辑30GGame port 博弈端口Garbage 无用信息Gateway 关口,网间连接GDS(Group Display System) 群显示系统Genealogy 家谱学,系统GES(General Edit System) 通用逻辑系统GIS(Geographic Information System) 几何图形信息系统Global communication 全球通信GPS(Global Positioning System) 全球定位系统Grammar checker 语法检验程序Graphics 图形学,制图技术Graphics accelerator 图形加速器Graphics coprocessor 图形协同处理程序31Grid 网格,坐标网络Gross index 粗索引Groupware 群件GUI(Graphical User Interface) 图形用户接口32HHacker 黑客Half-duplex transmission 半双工传输Handheld scanner 手持式扫描仪Handshaking 信号交换,接续Hard disk 硬磁盘Hard return 硬回车Hard-copy terminal 硬拷贝终端Hardware 硬件Hardware compatibility 硬件兼容性HDTV(High Definition Television) 高分辨率电视Help menu 求助菜单,求助项目单Head-mounted display 头盔式显示器Hidden computer 隐式计算机33Hierarchical database 分级数据库Hierarchy 分级,分层,层次Hierarchy chart 分级图表High resolution 高分辨率High-level programming language 高级程序设计语言Hold 握住Home directory 主目录Home network 本地网络Home record 引导记录,起始记录Host 主机Host adaptation 主机习惯性Host computer 主计算机Host operating system 主操作系统Host-to-host 主机到主机HTML(Hyper text Markup Language) 超文本标记语言34Hybrid network 混合式网络Hyperlink 超级链接Hypertext 超文本35IIcon 图符Identification system 识别系统Image file 映像文件Imaging system 成像系统IML(Initial Micro-code Load) 初始微码装入Impact 影响,冲击Impact printer 击打式打印机Importing file 输入文件Incremental backup 增量备份法Indexed file organization 索引文件组织Inference engine 推理机Information 信息,情报Information capacity 信息容量36Information function 信息函数Information management 信息管理Information overload 信息超载Information system 信息系统Information technology 信息技术Information transmission system 信息传输系统Information unit 信息单位Information utility 有用程序,信息应用程序,信息公用设施Inheritance 继承Initialize 初始化Ink-jet plotter 喷墨绘图仪Ink-jet printer 喷墨印刷机Input control 输入操纵器Input device 输入设备Input hard ware 输入硬件37Inquiry and communication system 查询与通信系统Insert 插入Insertion point 插入点Install 安装,建立Instruction cycle 指令周期Integrated circuit 集成电路Integrated software package 组合软件包Intellectual property 知识产权Intelligent robot 智能机器人Intelligent terminal 智能终端Interactive presentation 交互式演示Inter activity 交互性Interface 接口Intermediate node 中间网点Internal bus 内部总线38Internal hard disk drive 内部硬盘驱动器Internal modem 内部调制解调器International standard interface 国际标准接口Internet 互联网,信息网络实体Interpreter 解释程序,翻译机,转换机ISAM(Indexed Sequential Access Method) 索引顺序存取法ISDN(Integrated Services Digital Network) 综合服务数字网络Isolation 隔离,绝缘ISP(Internally Stored Program) 内部存储程序ISP(Internet Service Provider) 因特网服务提供商39JJAD(Joint Application Design) 联合应用程序设计Jerk 乱窜Jitter 抖动Job file 作业文件Job management 作业管理程序Junk mail 垃圾邮件Justification range 调整范围40KKey field 关键字字段Key search 关键字查找Keyboard 键盘Keyboard console 键盘操纵台Kilobyte 千字节Knowledge base 知识库Knowledge engineer 知识工程师Knowledge engineering 知识工程Knowledge system 知识系统41LLanguage translator 语言翻译程序Large-scale integrated circuit 大规模集成电路Laser 激光,激光器Laser communication 激光通信系统Laser printer 激光打印机Latency 延迟,执行时间Latent image 潜像Law 法律Layer 分层LCD(Liquid Crystal Display) 液晶显示器LEO(Low Earth Orbit) 近地轨道License 许可证Light pen 光笔Line printer 行式打印机42Line terminal multiplexer 终端复用器Linear 线性的,一次的Link 连接,连线,链接Linkage instruction 连接命令LISP programming language LISP 程序设计语言Live conversation 实际的对话Load 装入,加载Load server 加载服务器Local-area network 局域网Logic bomb 逻辑炸弹(病毒)Logic error 逻辑错误Logical operation 逻辑操作LOGO programming language LOGO 程序设计语言Look through 搜寻43Loop 循环,回路,环路Loss less 无损耗Lossy 有损耗的,有缺失的44MMAC(Memory access Controller) 存储器存取操纵器Machine cycle 机器周期Machine language 机器语言Macintosh (苹果公司生产的一种型号的)计算机Macro 宏,宏指令,宏定Macro virus 宏病毒Magnetic tape 磁带Magneto optical disk 磁光盘Mail server 邮件服务器Mailing list 邮件列表Main memory 主存储器Mainframe computer 主计算机Maintenance 保护,维修MAN(Maintenance Alert Network) 保护警报网45Manager 管理程序,管理人员Manipulate 操纵,操纵Manipulation 操纵,操纵,处理,操作Manual function 手动功能,人工功能Manufacturing support system 制造支持系统Marker 标记符Marketing model 市场销售模型Mark-recognition device 标记识别装置Master file 主文件Mathematic characterization of continuous image 连续图象的数学表征MDA(Multi-Dimensional Analysis) 多维分析MDT(Modified Data Tag) 修改过的数据标志Meeting software 会议软件Mega 兆Memory cycle 存储周期46Mega byte 兆字节Megahertz 兆赫Member record 成员记录Memory 经历存储,存储器Memory expansion card 存储器扩充卡Memory module 存储模块Menu bar 菜单条Menu-driven program generator 菜单驱动程序生成程序MED(Micro-Electronic Device) 微电子器件Meta-data 元数据MICR(Magnetic Ink Character Recognition) 磁性墨水字符识别Microcomputer 微型计算机Micro controller 微操纵器Microprocessor 微处理器Microwave 微波47Middleware communication model 媒件通信模型MIDI(Music Instrument Digital Interface) 乐器数字接口Miniaturization 小型化MIPS(Million Instructions Per Second) 每秒百万条指令Mirror 镜像MIS(Management Information System) 信息管理系统MMX technology MMX 技术Model 模型,机样,型号Modem 调制解调器Module design 模块设计Monitor 监视器,监督Monitor mode 监控方式Monochrome display 单色显示Mouse 鼠标Mouse pointer 鼠标指示器48Moving pictures 活动图象MPP(Massively Parallel Processor) 巨型并行处理器Multifunction device 多功能装置Multimedia 多媒体Multimedia environment 多媒体环境Multipartite virus 复合性病毒Multiplexer 多路转接器Multiplexing 多路转换Multipoint line 多点线路Multi-port 多端口Multiprocessing 多重处理Multiprogramming 多道程序设计(操纵)Multitasking 多任务Multi-user platform 多用户平台49NNarrow band services 窄带业务Nationwide network 全国范围的网络Natural language 自然语言Natural language processing 自然语言处理NC language processor NC 语言处理器Necessary bandwidth 必要带宽Net ware 网件Network 网络Network adapter 网络适配器Network computer 网络计算机Network database 网络数据库Network facilities resources 网络设备资源Network harms 网络损害50Network information resources 网络信息资源Network interface card (NIC) 网络接口卡Network piracy 网络盗版Network server 网络服务程序,网络服务器Networked hypertext protocol 网络超文本协议Neural network 神经网络Node 节点,网点Non-interacting control system 非交互式操纵系统Non-procedural language 非过程语言Non-volatile chain 非易失链NOS(Network Operating System) 网络操作系统Null set 空集Numeric key 数字键51OOAS(Office Automation System) 办公自动化系统Object 目标,对象,结果,物体Object code 目标代码OCR(Optical Character Recognition) 光符识别Odd parity 奇数奇偶校Off-line equipment 脱机设备Off-line storage 脱机存储器Off-the-shelf software 现成的软件OLE(Object Linking and Embedding) 对象的链接与嵌入OMR(Optical Mark Recognition) 光标记识别Onboard 板载的One-level code 一级代码One-to-many 一对多的52Online processing 联机处理Online storage 联机存储器OODBS(Object Oriented Data Base System) 面向目标的数据库系统OOO(Out Of Order) 发生故障,次序混乱Open network 开放式网络Operating environment 操作环境,运行环境Operating system 操作系统Operation control 操作操纵Operator 运算符,操作员Optical card 光卡Optical disk 光盘Optical Ethernet 光以太网Optimization 优化Optoelectronic receiver 光电子接收机Organization 机构,组织,结构,体系53Organization chart 组织图,结构图OS/360(Operating System/360) 360 型操作系统OSI(Open System Interconnection) 开放系统互连Output 输出Owner record 主记录,自由记录54PPackage 分组Packaged software 封装式软件包Packet 包,数据包,分组报文Packet switching 包交换Pager 页面调度程序Painting 涂色Parallel data transmission 并行数据传输Parallel implementation 并行执行Parallel port 并行端口Parallel processing 并行处理Parent record 母记录Parity bit 奇偶校验位Parity scheme 奇偶校验方案55PASCAL programming language PASCAL 程序设计语言Passive 无源的Passive network 无源网络Password 口令Path 路径PBX(Private Branch Exchange) 专用交换分机,用户交换机PC(Personal Computer) 个人计算机PC application software 个人计算机应用软件PC host operating system 个人计算机主机操作系统PCI(peripheral Component Interconnect)外围部件互连PCMCIA(Personal Computer Memory Card International Association) 个人电脑内存储卡国际协会PDA(Personal Digital Assistant) 个人数字助理PDL(Picture Description Language) 画面描述语言Peak 峰值56Peer-to-peer 层间,层到层PEM(Processing Element Memory) 处理单元存储器Perception system 感知系统Peripheral device 外围设备Personal finance software 个人财务软件Personal identification code 个人识别代码PERT chart editing PERT 图编辑PGP(Programmable Graphics Processor) 可编辑图形处理机Phonetic keyboard 语音键盘Photo-digital store 光数字存储器Photolithographic mask layer 光刻掩蔽层Physical storage 物理存储器PIM(Processor Interface Module) 处理程序接口模块PIN(Personal Identification Number) 个人识别号码Pixel store 像素存储器57PL/1 programming language PL/1 程序设计语言Platform position computer 平台位置计算机Plotter 绘图仪Plug and play system 即插即用系统Plug-in card 插件Pointing device 指示装置Point-of-sale terminal 销售点终端Point-to-point line 点对点线路,专用线Polymorphism 多形性,多机组合形势Pop-up menu 弹出选项单Port 端口,进出口Portable operating system 可移植操作系统Portable terminal 便携式终端POST(Power-on Self Test) 通电自检Power supply 电源,供电58PPP(Parallel Pattern Processor) 并行模式处理程序Precision 精确度Preliminary design 初步设计Presentation layer 表示层Presentation graphic 表示图形Presentation software 显示软件Preventive maintenance 预防性保护Previewing 预检,预览Primary storage 主存储器Print server 打印服务程序Printer 打印机Printing document 打印文档Privacy 保密性Procedural error 过程错误Procedural language 过程型语言59Procedure 过程,程序,步骤Process 处理,进程Process model 过程模型Processing 处理,加工Processing hardware 处理硬件Processor 处理程序,处理机Production language compiler 产生式语言编译程序Productivity 生产率Productivity tool 生产率工具Professional programmer 专业程序设计员Program 程序,计划,规划,方案Program file 程序文件Program flowchart 程序流程图Program independence 程序独立性Programmer 程序设计人员,编程器60Programming 程序设计,编程Programming language 程序设计语言Programming procedure 程序设计过程Project management software 工程项目管理,计划管理Project management software 工程项目管理软件PROLOG programming language PROLOG 程序设计语言Proprietary software 专有软件Proprietary system 专用系统Protocol 协议Prototype 样机,原型Prototyping 原型开发,样机研究Pseudo-code 伪代码Public communication carriers 公共通信载体Public domain 公用域Pull-down menu 下拉菜单61Pulse code modulation 脉冲码调制62QQBE(Query By Example) 仿效实例询问QIC(Quality Insurance Chain) 质量保证链Query 询问,查询Query facility 询问功能软件Query language 询问语言Query-and-reporting processor 询问与报告处理程序Quiet code 静止代码QWERTY keyboard QWERTY 键盘63RRAD(Rapid Access Device) 快速存取设备RAM(Random Access Memory) 随机存取存储器,内存Random access storage 随机存取存储器Random file organization 随机文件结构Raster graphics 光栅图形Reading 读,读取Real-time processing 实时处理Reasoning 推理,推论,推导Recalculation 重算Receiving entity 接收实体Receiving system 接收系统Record 记录Reference mark 参考标记64Reference model 参考模型Reference software 参考软件Refresh rate 更新率,刷新率Refreshable program 可刷新程序Regenerate 再生Register 寄存器Relational database 关系数据库Relational model 关系模型Release 释放Reliable 可靠的Reliability 可靠性Remote-control 遥控Remote device 远程设备Remote terminal 远程终端Removable hard disk 可移动硬盘65Repeater 中继器Repeater spacing 中继距离Replace command 替换命令Report generator 报告生成程序Resistor 电阻器Resolution 分辨率Retrieval performance 检索性能Return key 返回键RFI(Read Frequency Input) 读频率输入RGB monitor 红、绿、蓝显示器RIB(Resource Information Block) 资源信息块Ring network 环形网络RISC microprocessor RISC 微处理机Robot 机器人,自动仪Robotics 机器人学,机器人技术66Rollback 重新运行,重算ROM BIOS (Read-Only Basic Input/Output System) 只读存储器基本输入/输出系统Root record 根记录Router 发送程序,路由确定程序,路由器Row 行RPG(Report Program Generator) 报表程序生成程序RPS(Random Pattern Search) 随机模式搜索RS(Record Separator) 记录分隔符Run 运行Rupture 裂断,破裂67SSampling rate 取样率SAR(Source Address Register) 源地址寄存器Satellite 卫星,人造地球卫星Save 存储,储存Save area 储存区Scan 扫描Scanning device 扫描设备,扫描装置Scheduling software 调度软件Screen 屏幕Scrolling 卷动,滚动Scrubbing 除掉,刷去SCSI(Small Computer System Interface) 小型计算机系统接口SDL(System Development Language) 系统开发语言68Search 检索,查找Search command 查找命令Search engine 查找机Searching tool 搜寻工具Second-generation programming language 第二代程序设计语言Secondary application 辅助应用程序Secondary storage 辅助存储器,二级存储器Secondary storage sub system 辅助存储子系统Section overhead 段开销Sector 扇区,分段Security 安全性,保密性,安全措施Security system 安全系统Seek time 查找时间,定位时间Selection control 选择操纵Semiconductor 半导体69Semiconductor memory 半导体存储器Semi-structured information 半结构化问题Sender 发送器Sensor 传感器Sequence control 顺序操纵Sequential file organization 顺序文件组织Sequential storage 顺序存储器Serial 串行的Serial data transmission 串行数据传输Serial port 串行端口Serial processing 串行处理Server 服务器Service-independent network 与业务无关的网络Session layer 会话层Shared database 共享数据库70Sharing resource 共享资源SHELL software system SHELL 软件系统Shrink-wrapped multiprocessing operating system 精缩围绕多处理操作系统Silicon 硅SIMM(Single in-line Memory Module) 单列直插式存储模块Simplex transmission 单项传输Simulation programming language 模拟程序设计语言Simulator 模拟程序,模拟器Single user 用户Smalltalk programming language Smalltalk 程序设计语言Smart card 智能卡,收费卡Softcopy 软拷贝Software 软件,软设备Software engineer 软件工程师Software engineering 软件工程71Software license 软件许可证Software package 软件包,程序包Software piracy 软件非法翻印,软件侵犯版权Software suite 软件套件Software tool 软件工具Solid error 固定错误Sorting database 分类数据库Sound 声音Sound card 声卡Sound output 声音输出Source code 源代码Source date entry 源数据录入Source program file 源程序文件SPA(Signal Processing Auxiliary) 信号处理辅助设备Speech recognition system 语音识别系统72Speech synthesis 语音合成Speed 速度Speed up 加速Spelling checker 拼法检验程序Split 分发,分散Spreadsheet 电子数据表SQL(Structured Query Language) 结构化查询语言Squeeze 压缩Standardized port 标准化的端口Star network 星形网络STM(Short Term Memory) 短期存储器Storage 存储,存储器Storage hardware 存储硬件Strategic decision 战略性决策Streaming audio 流式音频73Streaming video 流式视频Stress 应力Structure chart 结构图Structured information 结构化信息Structured programming 结构化程序设计Structured walkthrough 结构化普查Subprogram 辅程序,子程序Supercomputer 巨型计算机Superconductor 超导体Supervisor 管理程序,主管人SVDF(Segmented Virtual Display File) 分段虚拟显示文件Swapping 交互,调动Switch 打开,开关,交换机Switching technique 交换技术Synchronous DXC 同步数字交叉连接74Synchronous transmission 同步传输Synchronous transmission system 同步传输系统Syntax 语法,句法Syntax error 语法错误System 系统,体制,装置System analysis 系统分析System analyst 系统分析员System clock 系统时钟System design 系统设计System development 系统开发System engineer 系统工程师System flowchart 系统流程图System implementation 系统实现方法System maintenance 系统保护System recovery 系统恢复75System software 系统软件System testing 系统测试System unit 系统单元76TTabulating machine 制机表Target variable 目标变量Task management 任务管理程序TCT(Terminal Control Table) 终端操纵表Telecommunication 远程通信,电信Teleconference 电信会议Telemedicine 电视医疗Telephone network 电话网Telephony 电话学Telex network 用户电报网Tel net 电信网,远程通信网络Terminal 终端Terminal address 终端地址77Terminal emulation 终端仿真Test 测试,检验Test equipment 测试设备Text 正文,文本Text segment 正文段Textual messages 文本信息Thesaurus 主题词表,同义词汇Third-generation programming language 第三腮程序设计语言Through-mode fashion 贯穿方式Time slicing 时间分片Time-sharing 分时,时间分配Tong-haul telecommunication system 长途通信系统Top-down program design 自顶向下程序设计Top management 主管,主控Touch screen 触屏78TPI(Target Position Indicator) 目标位置指示器TPS(Transaction Processing System) 事务处理系统TPT(Time Priority Table) 时间优先表Track 磁道,轨道,声道Trackball 跟踪球Traffic segregation 流量隔离Transaction 事项,事务处理,交易Transaction file 细目文件,事项文件Transient error 瞬时错误Transmission 传输,发送,传送Transmission unit 传输单元Translate 转换Tributary signals 支路信号Trojan horse 特洛伊木马True color 真彩色79Tuple 元组,字节组Turing test 图灵测试Twisted-pair wire 绞合线Typeface 字样80UUndo command 作废命令Unexpected halt 意外停机Unicode 单一代码UNIVAC(Universal Automatic Computer) 通用自动计算机Universal access 统一的接入Universal product code 通用产品代码Universally 普遍地,通用地UNIX operating system UNIX 操作系统Unprotected field 非保护字段Unstructured file 非结构文件Unstructured information 非结构信息UPS(Uninterruptible Power Supply) 不间断供电电源Upward compatibility 向上兼容性81URL(User Requirements Language) 用户要求语言USE(User System Evaluator) 用户系统评价程序User 用户,使用者User interface 用户接口Utility control console 有用操纵台Utility program 有用程序Utility unit 有用设备82VValue 值,算式Variable format 可变格式Varying bandwidth 可变宽带Vector graphics 向量图Version 文本,版本Very-high-level programming language 超高级程序设计语言Video compression 视频压缩Video computer system 可视计算机系统Video conference 视频会议Video file 可见文件Video memory 视频存储器Video scan 视频扫描Virtual classroom 虚拟教室83Virtual container 虚容器Virtual memory 虚拟机存储器Virtual office 虚拟办公室Virus 病毒Visual 图象的Visual programming 直观程序设计VLSI(Very-large-scale Integration) 超大规模集成电路Voice encoding techniques 语音编码技术Voice mail 声音邮件Voice output device 声音输出装置Voice recognition system 声音识别系统Volatile file 易变文件Volatile memory 易失性存储器VR(Virtual Reality) 虚拟现实VRAM(Video Random Access Memory) 视频随机存取存储器84VRM(Virtual Resource Manager) 虚拟资源管理程序VSAM(Virtual Sequential Access Method) 虚拟顺序存取法85WWait state 等待状态WAN(Wide Area Network) 广域网络Web browser 网页浏览器Web business 网上商务Web site 网站Wideband subscriber loop system 宽带用户环路系统Window mode 窗口方式Windows operating system Windows 操作系统Wired communication 有线通信Wireless communication 无线通信。

国内外遥感核心期刊

国内外遥感核心期刊

国内外遥感核心期刊中国科技论文统计源期刊-中国科技核心期刊:科技部中信所评价期刊学术质量和影响得出,用于科研绩效评估。

中国科学引文索引数据库:中科院编制,偏重于基础科学领域的期刊中文核心期刊:北京大学图书馆编制,指导图书馆的文献采购中国核心期刊遴选数据库:万方数据公司制作的科技期刊资源数据库,不用于评价中国学术期刊(光盘版)/中国期刊全文数据库/中国学术期刊综合评价数据库:清华大学制作的科技期刊资源数据库,不用于评价中文核心期刊:------------------------------------------------------------------------------- 遥感学报地理与地理信息科学地理研究计算机工程与应用微计算机信息计算机应用研究中国图像图形学报计算机应用与软件测绘学报武汉大学学报信息科学版测绘通报地图遥感学报大地测量与地球动力学测绘科学测绘学院学报安徽农业科学中国科技核心期刊:---------------------------------------------------------遥感技术与应用遥感信息地球科学信息世界地质国土资源遥感环境保护科学测绘工程普通期刊:-------------------------------------------------------------地理空间信息国外遥感类相关杂志与投稿1. 期刊名称:GPS SOLUTIONSISSN: 1080-5370出版频率: Quarterly出版社: SPRINGER HEIDELBERG, TIERGARTENSTRASSE 17, HEIDELBERG, GERMANY, D-69121 影响因子:主题范畴: REMOTE SENSING变更情况: 2005New2. 期刊名称:SURVEY REVIEWISSN: 0039-6265出版频率: Quarterly出版社: COMMONWEALTH ASSOC SURVEYING LAND ECONOMY, C A S L E, UNIV WEST ENGLAND,C/O FACULTY BUILT ENVIRONMENT,FRENCHAY CAMPUS, COLDHARBOUR LBRISTOL, ENGLAND, BS16 1QY 期刊网址:/影响因子: 0.102(2002)主题范畴: GEOSCIENCES, MULTIDISCIPLINARY; REMOTE SENSING; ENGINEERING, CIVIL 3. 期刊名称:PHOTOGRAMMETRIC RECORDISSN: 0031-868X出版频率: Quarterly出版社: PHOTOGRAMMETRIC SOC, UNIV COLL LONDON, DEPT GEOMATIC ENGINEERING,GOWER ST, LONDON, ENGLAND, WC1E 6BT出版社网址:/期刊网址:/publications/publicationsFrameset.htm影响因子: 0.353(2001); 0.633(2002)主题范畴: GEOGRAPHY, PHYSICAL; GEOSCIENCES, MULTIDISCIPLINARY; REMOTE SENSING; PATHOLOGY4. 期刊名称:INTERNATIONAL JOURNAL OF REMOTE SENSINGISSN: 0143-1161版本: SCI-CDE出版频率: Semimonthly出版社: TAYLOR & FRANCIS LTD, 4 PARK SQUARE, MILTON PARK, ABINGDON, ENGLAND, OX14 4RN出版社网址:/期刊网址:/journals/tf/01431161.html影响因子: 0.827(2001),1.154(2002)主题范畴: REMOTE SENSING; IMAGING SCIENCE & PHOTOGRAPHIC TECHNOLOGY5. 期刊名称:PHOTOGRAMMETRIC ENGINEERING AND REMOTE SENSINGISSN: 0099-1112版本: SCI-CDE出版频率: Monthly出版社: AMER SOC PHOTOGRAMMETRY, 5410 GROSVENOR LANE, SUITE 210, BETHESDA, MD, 20814-2160出版社网址:/期刊网址:/publications.html影响因子: 0.841(2001);1.176(2002)主题范畴: GEOGRAPHY, PHYSICAL; GEOSCIENCES, MULTIDISCIPLINARY; REMOTE SENSING; PATHOLOGY6. 期刊名称:JOURNAL OF GEODESYISSN: 0949-7714版本: SCI-CDE出版频率: Monthly出版社: SPRINGER-VERLAG, 175 FIFTH AVE, NEW YORK, NY, 10010出版社网址:/期刊网址:/app/ ... gpublicationresults,id:100435,1 影响因子: 0.960(2001),0.726(2002)主题范畴: GEOCHEMISTRY & GEOPHYSICS; REMOTE SENSING7. 期刊名称:ISPRS JOURNAL OF PHOTOGRAMMETRY AND REMOTE SENSINGISSN: 0924-2716出版频率: Quarterly出版社: ELSEVIER SCIENCE BV, PO BOX 211, AMSTERDAM, NETHERLANDS, 1000 AE出版社网址:http://www.elsevier.nl期刊网址:http://www.elsevier.nl/locate/isprsjprs影响因子: 0.963(2001),0.389(2002)主题范畴: GEOGRAPHY, PHYSICAL; GEOSCIENCES, MULTIDISCIPLINARY; REMOTE SENSING; IMAGING SCIENCE & PHOTOGRAPHIC TECHNOLOGY8. 期刊名称:RADIO SCIENCEISSN: 0048-6604版本: SCI-CDE出版频率: Bimonthly出版社: AMER GEOPHYSICAL UNION, 2000 FLORIDA AVE NW, WASHINGTON, DC, 20009出版社网址:/期刊网址:/journals/rs/影响因子: 1.139(2001),0.796(2002)主题范畴: GEOCHEMISTRY & GEOPHYSICS; METEOROLOGY & ATMOSPHERIC SCIENCES; REMOTE SENSING; TELECOMMUNICATIONS; INSTRUMENTS & INSTRUMENTATION9. 期刊名称:IEEE TRANSACTIONS ON GEOSCIENCE AND REMOTE SENSINGISSN: 0196-2892版本: SCI-CDE出版频率: Bimonthly出版社: IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, 345 E 47TH ST, NEW YORK, NY, 10017-2394出版社网址:/portal/index.jsp期刊网址:/soc/grss/tgars.html影响因子: 1.605(2001),1.603(2002)主题范畴: GEOCHEMISTRY & GEOPHYSICS; REMOTE SENSING; ENGINEERING, ELECTRICAL & ELECTRONIC10. 期刊名称:REMOTE SENSING OF ENVIRONMENTISSN: 0034-4257版本: SCI-CDE出版频率: Monthly出版社: ELSEVIER SCIENCE INC, 360 PARK AVE SOUTH, NEW YORK, NY, 10010-1710出版社网址:http://www.elsevier.nl/期刊网址:http://www.elsevier.nl/inca/publications/store/5/0/5/7/3/3/index.htt 影响因子: 1.697(2001),1.992(2002)主题范畴: REMOTE SENSING; ENVIRONMENTAL SCIENCES; IMAGING SCIENCE & PHOTOGRAPHIC TECHNOLOGY11. 期刊名称:CANADIAN JOURNAL OF REMOTE SENSINGISSN: 0703-8992出版频率: Bimonthly出版社: CANADIAN AERONAUTICS SPACE INST, 1685 RUSSELL RD, UNIT 1-R, OTTAWA, CANADA, K1G 0N1出版社网址:http://www.casi.ca/期刊网址:http://www.casi.ca/index.php?pg=cjrs影响因子: no主题范畴: REMOTE SENSING12. 期刊名称:IEE Proceedings -- Radar, Sonar & Navigation (已经更名:IET Radar, Sonar & Navigation)ISSN: 1350-2395版本: SCIE出版频率: Bimonthly出版社: IEE-INST ELEC ENG, MICHAEL FARADAY HOUSE SIX HILLS WAY STEVENAGE, HERTFORD, ENGLAND, SG1 2AY出版社网址:期刊网址:/IP-RSN影响因子: no主题范畴: radar, radio location, radio navigation and surveillance purposes. Examples of the fields of application include radar, sonar, electronic warfare, avionic and navigation systems. Processing directed towards the above application areas includes advances in matched filters and wideband signal correlation for radar and sonar systems; algorithms and processor designs for adaptive array; bearing estimation; range/Doppler radar and acoustic image processing operations for SAR, sonar, target identification functions, etc13. 期刊名称:IEEE Transactions on Image ProcessingISSN: 1057-7149版本: SCI出版频率: Monthly出版社: IEEE Signal Processing Society出版社网址:期刊网址:/servlet/opac?punumber=83影响因子: no主题范畴: Signal-processing aspects of image processing, imaging systems, and image scanning, display, and printing. Includes theory, algorithms, andarchitectures for image coding, filtering, enhancement, restoration, segmentation, and motion estimation; image formation in tomography, radar, sonar, geophysics, astronomy, microscopy, and crystallography; image scanning, digital half-toning and display, andcolor reproduction.14. 期刊名称:Geophysical Research LettersISSN: 0094-8276版本: SCI出版频率: Semimonthly出版社: AMER GEOPHYSICAL UNION, 2000 FLORIDA AVE NW, WASHINGTON, USA, DC, 20009 出版社网址:期刊网址:/journals/gl/影响因子: 2.491(2005)主题范畴: focus on a specific discipline or apply broadly to the geophysical science community15. 期刊名称: IEEE Transactions on Geoscience and Remote Sensing Letter ISSN: 0196-2892版本:出版频率:出版社: TGARS Manuscript Reivew Assistant, GEOSCIENCE AND REMOTE SENSING LETTERS,IEEE Periodicals,445 Hoes Lane Piscataway, NJ 08855 USA出版社网址:期刊网址:/menu.taf?menu=publications&detail=GRSL影响因子:主题范畴: GEOCHEMISTRY & GEOPHYSICS; REMOTE SENSING; ENGINEERING, ELECTRICAL & ELECTRONIC16. 期刊名称:IEEE TRANSACTIONS ON AEROSPACE AND ELECTRONIC SYSTEMSISSN: 0018-9251版本: sci出版频率: Quarterly出版社: Aerospace & Electronic Systems Society出版社网址:期刊网址:/servlet/opac?punumber=7影响因子:主题范畴: the equipment, procedures, and techniques applicable to the organization, installation, and operation of functional systems designed to meet the high performance requirements of earth and space systems17. 期刊名称:Pattern Recognition LettersISSN: 0167-8655版本: SCIE出版频率: Subscriptions for the year 2007, Volume 28, 16 issues出版社: ELSEVIER SCIENCE BV, PO BOX 211, AMSTERDAM, NETHERLANDS, 1000 AE出版社网址:期刊网址:/wps/find/journaldescription.cws_home/505619/descr iption#description影响因子: 2005: 1.138主题范畴: ? statistical, structural, syntactic pattern recognition;? neural networks, machine learning, data mining;? discrete geometry, algebraic, graph-based techniques for pattern recognition;? signal analysis, image coding and processing, shape and texture analysis;? computer vision, robotics, remote sensing;? document processing, text and graphics recognition, digital libraries;? speech recognition, music analysis, multimedia systems;? natural language analysis, information retri;? biometrics, biomedical pattern analysis and information systems;? scientific, engineering, social and economical applications of pattern recognition;? special hardware architectures, software packages for pattern recognition.18. 期刊名称:Multidimensional Systems and Signal ProcessingISSN: 0923-6082 (Print) 1573-0824 (Online)版本:出版频率: Monthly出版社: Springer Netherlands出版社网址:期刊网址:/site/catalog/Journal/1582.jsp?top=2&mid=3&bottom=7&su bsection=12影响因子: 0.722 (2005)主题范畴: While the subject of multidimensional systems is concerned with mathematical issues designed to tackle a broad range of models, its applications in signal processing have been known to cover spatial and temporal signals of diverse physical origin. The current problem faced, due to the widely scattered nature of publications in this area, will be circumvented through the unity of theme in thisjournal, so that research is facilitated and expected with much reduced duplication of effort and much enhanced communication.19. 期刊名称:International Journal of Applied Earth Observation and Geoinformation ISSN: 0303-2434版本: SCIE出版频率: Quarterly出版社: ELSEVIER出版社网址:期刊网址:/wps/find/journaldescription.cws_home/622741/descr iption#description影响因子:主题范畴: The International Journal of Applied Earth Observation and Geoinformation publishes original papers that apply earth observation data to inventory and management of natural resources and the environment. In this context, earth observation data are normally those acquired from remote sensing platforms such as satellites and aircraft, complemented and supplemented by surface and subsurface measurements and mapping. Natural resources include forests, agricultural land, soils, water resources, mineral deposits, and land itself as a foundation for infrastructure and housing. Environmental issues include biodiversity, land degradation, industrial pollution and natural hazards such as earthquakes, floods and landslides. The focus, which can be either conceptual or data driven, includes all major themes in geoinformation, like capturing, databasing, visualization and interpretation of data, but also issues of data quality and spatialuncertainty. Since the scope is large, contributions should be of the highest quality. Some will convey important recommendations for environmental management and policy, and we encourage 'Discussion' articles that stimulate dialogue between earth observation studies and managers in a statistically sound way. Papers addressing these topics in the context of the social fabric and economic constraints of developing countries are particularly welcome.20. 期刊名称:Computers & GeosciencesISSN: 0098-3004版本: SCIE出版频率: Subscriptions for the year 2007, Volume 33, 10 issues出版社: ELSEVIER出版社网址:期刊网址:/wps/find/journaldescription.cws_home/398/descript ion#description影响因子: 2005: 0.779主题范畴: spatial analysis, geomathematics, modelling, simulation, statistical and artificial intelligence methods, e-geoscience, geoinformatics, geomatics, geocomputation, image analysis, remote sensing, and geographical information science.21. 期刊名称:SIGNAL PROCESSINGISSN: 0165-1684版本: SCIE出版频率: Monthly出版社: ELSEVIER出版社网址:期刊网址:/wps/find/journaldescription.cws_home/505662/descr iption#description影响因子: 2005: 0.694主题范畴: Signal Theory; Stochastic Processes; Detection and Estimation; Spectral Analysis; Filtering; Signal Processing Systems; Software Developments; Image Processing; Pattern Recognition; Optical Signal Processing; Digital Signal Processing; Multi-dimensional Signal Processing; Communication Signal Processing; Biomedical Signal Processing; Geophysical and Astrophysical Signal Processing; Earth Resources Signal Processing; Acoustic and Vibration Signal Processing; Data Processing; Remote Sensing; Signal Processing Technology; Speech Processing; Radar Signal Processing; Sonar Signal Processing; Industrial Applications; New Applications22. 期刊名称:Journal of Quantitative Spectroscopy & Radiative TransferISSN: 0022-4073版本: SCIE出版频率: Subscriptions for the year 2007, Volumes 103-108, 18 issues出版社: ELSEVIER出版社网址:期刊网址:/wps/find/journaldescription.cws_home/272/description#description影响因子: 2005: 1.685主题范畴:· Theoretical and experimental aspects of the spectra of atoms, molecules, ions, and plasmas. · Spectral lineshape studies including models and computational algorithms. · Atmospheric spectroscopy. · Theoretical and experimental aspects of light scattering. · Application of light scattering in particle characterization and remote sensing. · Application of light scattering in biological sciences and medicine. · Radiative transfer in absorbing, emitting, and scattering media. · Radiative transfer in stochasticmedia. · Electromagnetic energy transfer with near-field, nano-scale, and coherent effects. · Planetary, atmospheric, and environmental radiative transfer. · Radiative transfer in high-temperature environments, combustion systems, and fires. · Radiant energy emission from plasmas.。

一种基于图生成最优加法链的新方法(IJMSC-V3-N2-4)

一种基于图生成最优加法链的新方法(IJMSC-V3-N2-4)

I.J.Mathematical Sciences and Computing,2017, 2, 37-54Published Online April 2017 in MECS ()DOI: 10.5815/ijmsc.2017.02.04Available online at /ijmscA New Method of Generating Optimal Addition Chain Based onGraphK. Mani a, M. Viswambari ba Nehru Memorial College, Puthanampatti, Trichy, TamilNadu, India-621 007b Nehru Memorial College, Puthanampatti, Trichy, TamilNadu, India-621 007AbstractIn many number theoretic cryptographic algorithms, encryption and decryption is of the form x n mod p, where n and p are integers. Exponentiation normally takes more time than any arithmetic operations. It may be performed by repeated multiplication which will reduce the computational time. To reduce the time further fewer multiplications are performed in computing the same exponentiation operation using addition chain. The problem of determining correct sequence of multiplications requires in performing modular exponentiation can be elegantly formulated using the concept of addition chains. There are several methods available in literature in generating the optimal addition chain. But novel graph based methods have been proposed in this paper to generate the optimal addition chain where the vertices of the graph represent the numbers used in the addition chain and edges represent the move from one number to another number in the addition chain. Method 1 termed as GBAPAC which generates all possible optimum addition chains for the given integer n by considering the edge weight of all possible numbers generated from every number in addition chain. Method 2 termed as GBMAC which generates the minimum number of optimum addition chains by considering mutually exclusive edges starting from every number. Further, the optimal addition chain generated for an integer using the proposed methods are verified with the conjectures which already existed in the literature with respect to addition chains.Index Terms: Optimal Addition Chain, Graph, Conjectures, All Possible Addition Chain, Minimal Addition Chain.© 2017 Published by MECS Publisher. Selection and/or peer review under responsibility of the Research Association of Modern Education and Computer Science1.IntroductionAn addition chain is a finite sequence of positive integers called elements, 1= a0 ≤ a1≤ a2 ≤ …≤ a r = n with the property that for all i>0 there exist a,j, k with a i=a j+a k and r ≥ i ≥ j ≥ k ≥ 0. This is called an addition chain * Corresponding author. +917502334348E-mail address: viswa1391@of length r for the target n. An optimal addition chain is the one which has the shortest possible length denoted by l(n)and it is a strictly increasing sequence as duplicate chain elements could be removed to shorten the chain [14].In addition chain, t he first number is always one, every subsequent number is obtained by adding two early numbers and n occurs at end of the chain. For the given exponent, it is possible to generate several addition chains, and the least length is better. If the shortest addition chain is found, then it will be useful to reduce the number of multiplications. Finding the optimal addition chain is very difficult and not necessarily unique. But it is enough to find optimal addition chain. Though, for the given integer, finding at least one of the shortest addition chains is an NP-hard problem. Based on the shortest addition chain, modular exponentiation is performed very fast. For example, when n=170, all possible optimum addition chains are1-2-3-5-10-20-40-45-85-170 1-2-3-5-10-20-40-80-85-170 1-2-3-5-10-20-40-80-90-1701-2-3-5-10-20-40-80-160-170 1-2-4-5-10-20-40-45-85-170 1-2-4-5-10-20-40-80-85-1701-2-4-5-10-20-40-80-90-170 1-2-4-5-10-20-40-80-160-170 1-2-4-6-10-20-40-80-90-1701-2-4-6-10-20-40-80-160-170 1-2-4-8-9-17-34-51-85-170 1-2-4-8-9-17-34-68-85-1701-2-4-8-9-17-34-68-102-170 1-2-4-8-9-17-34-68-136-170 1-2-4-8-10-20-40-80-90-1701-2-4-8-10-20-40-80-160-170 1-2-4-8-16-17-34-51-85-170 1-2-4-8-16-17-34-68-85-1701-2-4-8-16-17-34-68-102-170 1-2-4-8-16-17-34-68-136-170 1-2-4-8-16-18-34-68-102-1701-2-4-8-16-18-34-68-136-170 1-2-4-8-16-32-34-68-102-170 1-2-4-8-16-32-34-68-136-170This is because the element 5 in the addition chains can be formed as (5= 2+3, 5= 4+1), 10 can be formed as (10= 5+5, 10= 8+2, 10= 6+4), 17 can be formed as (17= 8+9, 17= 16+1). Then, 34 can be given as (34=17+17, 34=18+16), 85 can be formed as (85= 45+40, 85= 80+5, 85= 51+34, 85= 68+17). Finally, for 170 it can be formed as (170= 85+85, 170= 90+80, 170= 160+10, 170= 102+68, 170=136+34).It is a known fact that larger the size of the field utilized, harder the problem of optimizing the computation of the field exponentiation. This is because a heuristic strategy is normally used to find the optimal addition chain for hard optimization problems. Since these problems have huge search spaces, they do not provide the guarantee on the quality of the solutions. Normally, a heuristic method starts from a non-optimal solution (partial solution) and iteration. After performing some iteration, it improves the solution until a reasonable valid solution could be achieved. Thus, to improve the partial solution which is considered at the initial stage, either deterministic or probabilistic search criteria is used [18].Many methods already exist in the literature to generate the optimal addition chain. They are classified into two types viz.; deterministic and evolutionary algorithms. In deterministic, the optimal addition chain may not be obtained at all time. This is because everything is predetermined. Binary method, factor method, window method, sliding window method etc., are some examples of deterministic type. Evolutionary algorithms are inspired by the idea of either natural evolution or social behaviour of insects or birds. Though they may produce optimal addition chains for an integer, they are not obtained by a single run which eventually takes more time. Genetic Algorithm (GA), Artificial Immune System (AIS), Ant Colony Optimization (ACO), Particle Swarm Optimization (PSO) etc., are some evolutionary algorithms.The rest of the paper is organized as follows. Section 2 illustrates the work related to the addition chain. Section 3 describes some basic definitions commonly used in the literature of addition chain. The proposed methods for generating addition chain based on graphical representation and the working principle of the said methods are shown in section 4. Section 5 discusses the experimental results and their significance. Finally, section 6 ends with conclusion.2.Related WorkThis section shows various related work that were done in the available literature in generating the addition chain and their usefulness in the proposed work.Edward G. Thurber [2] has described the computational aspects of generating minimal length of addition chains for integer n. In that, Search time for such chains was cut down using various pruning techniques. To increase the efficiency of the search further, the author introduced slant bounds. Also proved Scholz-Brauer Conjecture was true if n includes an l0-chain among its minimal chains. In [3], Noboru Kunihiro and et. al. have proposed two methods called run-length method and hybrid method to generate the addition chain. And the performance of these two methods are analysed and finally proved that the hybrid method is efficient than the other methods. The method reduces the addition chain length by 8% compared to other methods. This method works especially for numbers with large hamming weight.Peter Tummeltshammer and James C. Hoe and Markus Puschel [4] have proposed a circuit based approach which combines the addition chains with constants. In this they have also proposed an algorithm which generates all the constants in the given set. They evaluated the quality of circuit using standard cell library. Also they compared the latency and efficiency of the addition chain based approach with the full multiplier. The method generates an algorithm which provides the multiplication logic using a multiplication circuit. Daniel J. Bernstein [6] has presented two new constructive upper bounds on the cost of two- dimensional addition chains. He also proposed a new binary chain to compute and used three additions per exponent bit in order to help protect against side-channel attacks. In [7] Younho Lee et. al., have proposed an algorithm to find addition/ subtraction chain and reduced the number of windows by subtraction which was based on small window method, and proved that the proposed algorithm found the shorter addition/ subtraction chain compared with previous algorithms.In [8], Nareli cruz-cortes et.al. have explained the use of artificial immune system (AIS) for generating addition chain. They proposed a method for finding addition chains for hard exponents and the shortest addition chain for exponents of size less than 20 bits. The usage of probabilistic heuristic based on AIS search engine for large exponents was proposed. Raveen R. Goundar et al. [9] has proposed a new strategy to find an efficient doubling- free short addition-subtraction chain for an arbitrary integer by utilizing a precise golden ratio. They showed that Golden Ratio Addition Subtraction chain (GRASC) method has attained 12% to 28% reduction in average chain length compared to other methods.Raveen R. Goundar et. al. [10] has proposed an efficient SPA resistant elliptic curve scalar multiplication algorithm over odd prime fields. They also proposed an explicit algorithm short addition-subtraction chain by utilizing golden ratio and named it as Golden Ratio Addition Chain (GRAC). The proposed method has attained 3% to 18% reduction in the average chain length. In [11] Fabien et al., have proposed a method to modify a key generation using small Euclidean addition chain which secure against side-channel attacks. Two different ways to generate Euclidean addition chains was proposed. One was analysis of the size and another was distribution of obtained keys. A new scheme in the context of fixed base point scalar multiplication was proposed.Maurice Mignotte and Amadou Tall [12] have presented the binary method which is optimal for any integer of hamming weight 1 or 2 and also showed that there are exactly four types of addition chains possible for those kind of integers. They proved that binary method is not optimal for integers of hamming weight 3. In [13], Saul Dominguez-Isidro presented Evolutionary Programming (EP) to minimize the length of addition chains. Also, four experiments were designed to test the performance of EP algorithm. This requires less evaluation per run with respect to some state-of-the-art nature-inspired algorithms. Neill Michael Clift [14] described a new algorithm for calculating optimal addition chain. For this, pre-computed values are not needed. This algorithm was faster to calculate ranges of optimal addition chain. In [15], Amadou Tall has proposed Lucas addition-subtraction chains. They also proved that Lucas addition chain gives minimal addition chains for all even integers.M. A. Mohamed and K. A. Mohd Atan [16] have described a new method called composition method in which it is based on the generalization of decomposition method in which the optimal nearer addition chain is almost obtained. In composition method a single rule is used whereas in decomposition method, it uses dedicated rule for each prime from decomposed n. Amadou Tall and Ali Yassin [17] presented a new way of computing the shortest addition chains using generalized continued fractions and Euclidean algorithm. YaraElias and Pierre McKenzie [19] have established the results for arbitrary fixed g and adapted methods for constructing g- addition chains when g=2 to the case g>2.In [20] MA Mohamed and MR MD SAID, have proposed an idea of non-adjacent form into decomposition method at prime layer and named the new hybrid method as signed decomposition method (SDM). And proposed SDM produces shorter addition subtraction chain than older methods. Sajal Chakroborty and Babul Hasan [21] have proposed a technique for scenario based multi-period stochastic programming problems. They developed the technique on decomposition based pricing method. A model was also developed by collecting data from super market and analyzed the profit.3.Basic DefinitionsThis section describes the basic definitions related to addition chains which are useful in understanding the proposed methodology.3.1. Basic steps in addition chainThe construction [14] of each element of an addition chain is called a step. For an addition chain 1 = a0≤ a1≤· · · ≤ a r = n, the following steps are involved.Doubling step: a i = 2a i−1, i > 0Non-doubling step: a i = a j + a k , i > j > k ≥ 0The steps of the form a i = 2a j, j ≤ i −2 are defined as non-doubling steps.Big step: λ(a i) = λ(a i-1) +1Small step: λ(a i) = λ(a i-1)Thus, the length of the addition chain l(n) can be split into two components asl(n) = λ(n)+S(n)It is noted that, not all doubling steps are big steps but big steps are always doubling [14]. Because λ(n) is fixed for a given positive integer, finding optimal addition chains amounts to minimizing the number of small steps across all possible chains. Once the addition chain is generated it must be proved or disproved with various conjectures which already exist in the literature.As Knuth observed [1], either λ(ai) = λ(ai-1) or λ(ai) = λ(ai-1) + 1. In the former case, step i is called a small step and is called a big step otherwise. There are exactly λ(n) big steps in any chain for n. The number of steps, r, in an addition chain for n can be expressed as r = λ(n) +N(n), where N(n) denotes the number of small steps in the chain. It should be noted that N(n) is chain dependent. Minimizing N(n) will result in a minimal length addition chain for n. If j = i -1, then step i is called a star step. An addition chain that consists entirely of star steps is called a star chain. If j = k = i- 1, then step i is called a doubling [2].3.2. Conjectures in addition chainThe various existing conjectures in the addition chain proposed in the literature [12] are∙For any integer n>2k with kϵN, if l(n)=k+1, then n=2k+2j for some j≤k.∙l(2n) = l(n)+1.∙l(2n)≥ l(n).∙If p is a prime, show that, n=2p-1 is also prime (Mersenne prime.), then l(n)= max {l(m); m≤n}, 2≤p≤7.∙l(2n-1) ≤ n-1+l(n).l(n) ≤ log2 (n)+ S2 (n) -1.4.Proposed MethodologyA graph based addition chain has been proposed in this paper. It is noted that a graph denoted as G = (V, E) consists of the set of vertices V = {v1, v2,…,v n} and the set of edges E = {e1, e2,…,e n}. But in the proposed graph based addition chain V represents the set of intermediate numbers which are being used in the addition chain. E represents the edges to connect two numbers in the addition chain. The weight of edge denoted as w(e) is a non-negative integer. Initially, w(e) is assigned 1 and it is incremented by 1 when the same edge is used in generating the addition chain. Without loss of generality, let v1 =1, v i =2, vj= m, 3 ≤ j< l, where m is a non-negative integer except 1, 2and n, and v l=n, where l is the last vertex in which addition chain is to be terminated.A multi-digraph G is a finite non-empty set of objects called vertices denoted by V with a multi-set of ordered vertex pairs called arcs denoted by E. Duplicate elements are allowed in a multi-set. An edge goes from a vertex u ∈V to a vertex v ∈V if (u, v) ∈E [14]. A directed multi-digraph (V, E) consists of vertices V and edges E and a function f: E→ V × V = {(u, v)|u, v ∈V}.In the proposed graph based addition chain, to generate the addition chain acyclic multi digraph is used. This is because minimum two numbers can be generated from a particular number by adding the current number to the previous number or doubling the current number itself.Formally for an addition chain A of length r we have a multi-digraph G A = (V, E, α, ω) where V is the set of vertices, E is the set of edges and α, ω are mappings that take an edge to its start and end vertex respectively. This gives V = {v i: 0 ≤ i ≤ r} and E = {(vγ (i), vi), (vδ(i), vi) : 1 ≤ i ≤ r}, α, ω : E → V, (v1, v2) α → v1, (v1, v2) ω → v2. We label each vertex with its numerical value from the addition chain. In a graph with directed edges, the in-degree of a vertex v, denoted as deg−(v), is the number of edges with v as their terminal vertex. The out-degree of a vertex v, denoted as deg+ (v), is the number of edges with v as their initial vertex. Thus, for each vertex, the d+and d-are minimum two except the first. The vertex would have represented an element calculated in the chain that was not used in the construction of the target.4.1. Proposed Method 1: Graph Based All Possible Addition Chain (GBAPAC)In the proposed GBAPAC method, the first two numbers are always 1 and 2 and the last number is always n, where n is the number for which addition chain is to be formed. To generate the next number in the addition chain from 2, the possibilities are 3 and 4. They are obtained by addition and doubling steps respectively and their corresponding edge weight of 2-3, 2-4 is 1. As 3 and 4 are generated simultaneously from 2, any one of them is considered as next number in the addition chain.Suppose 3 is selected as next number, the other possible numbers from 3 are 4, 5, 6, where 4, 5 are obtained by addition step and 6 is by doubling step. As three numbers are generated from 3, the weight of edge 2-3 is 4 (1+ 3=4) but the edge weight for 3-4, 3-5, 3-6 is 1, since those edges are newly generated. Similarly, if 4 is taken as the next number in addition chain the weight of edge 2-4 is 4 (1+3) with the possibilities from 4 are 5, 6 and 8. Correspondingly the edge weight for 4-5, 4-6, 4-8 is 1. Likewise, taking 5 as next number, 5 can be generated from both 3 and 4. If 5 is obtained from 3, then the other possible numbers from 5 are 6, 7, 8 and10. At the same time edge weight for 2-3 is 6 and 3-5 is 5 but the edge for 5-6, 5-7, 5-8, 5-10 is 1 because they are newly created edges. On the other hand, if 5 is obtained from 4, then the other possibilities are 6, 8, 9 and 10 and their corresponding edge weight is 1. But the edge weight of 2-4 and 4-5 is incremented by one every time when a new possibility is generated. Thus, the edge weight for 2-4 is 6 and 4-5 is 5. The process is terminated when n is reached.In general, let i=1; v i=1 and v i+1=2. The corresponding edge weight w(e i(v i, v i+1))=1. To generate the next number, i=i+1; v i← v i+1, where v i+1is computed as v i+1 ← {v i+v j , 1≤j≤i} , w(e i(v i, v i+1))=1, w(e i(v i, v i-1))= w(e i(v i-1, v i))+ d+(v i). As v i+1 has sometime more than one possibility depending on j, at a time any one value ofv i+1 will be taken as the next number randomly. From that, other possible numbers are generated using addition and doubling. The edge weight will be increased based on the numbers which occur previously in the addition chain. Similar process can also be performed for other possibilities of v i+1. The process is repeated till it reaches n and the optimal addition chain is one which has maximum edge weight between numbers starting from 1 to n or the length of the addition chain for the given integer n is accepted as input. The proposed GBAPAC method is shown in algorithm 1.Algorithm 1 GBAPAC(n)//This algorithm is used to find the optimal addition chain for the given integer n//opac – optimal addition chain, lopac – length of opacInput n, wOutput opac (n), lopac (n)BeginStep 1: Initialization of required variablesi ← 1; c1← 1; c2← 2;Step 2: Outputting the first edge of addition chainPrint C1‘-‘ C2Step 3: Switching to the next number of addition chaine1 (i) ← c1|| c2w1 (i) ← 1; e2 (i) ← c2|| c3; w2 (i) ← 1opac (i) ← e1 (i) ; lopac (i) ← 1pac (i) ← e1 (i) || e2 (i)lpac (i) ← w1 (i) + w2 (i)Step 4: Repeat the following till the optimal addition chain is reacheddo{i++if (i≥ 2){t ← c3c1← c2; c2← t; e1 (i) ← c1|| c2w1 (i) ← w1 (i-1) + d+(v i) *e2 (i) ← c2|| c3; w2 (i) ← 1opac (i) ← pac (i-1); lopac (i) ← w1 (i)opac (i) ← opac || C3; lpac (i) ← lpac (i) + 1i++;}}while (lopac ≤ w && c3 == n)Algorithm 2 GBMAC(n)All the steps involved in algorithm 1 GBAPAC are also used in algorithm 2 GBMAC except w 1 (i) ← w 1 (i-1)+14.1.1. The working principle of GBAPAC algorithmThe working principle of the proposed GBAPAC algorithm is shown in Table 1. In order to understand the proposed method, the following notations are used.{ac- Addition chain; c 1- previous number in ac; c 2-current number in ac; c 3-next number in ac e(c i , c j ): edge between i th and j th number; w(e):weight of edge e; l(ac)- length of addition chain; opac -optimal addition chain; l(opac)-length of opac; apac: possible addition chain; l(apac)-length of apac}.Table 1. Working Principle of GBAPAC4.1.2. Proposed Method 1 – An ExampleTo generate the addition chain for an integer n=12. The length of the addition chain given as input is 4. As the addition chain always starts with 1, i.e., v 1=1 and the next number should be 2 i.e., v 2=2 which is obtained either by adding 1 to itself or doubling it. Since 1 and 2 are must in generating the addition chain for 12, the edge weight is not considered. It is shown in fig.1.c 1 c 2 c 3 e 1(c 1,c 2) w(e 1) e 2(c 1,c 2) w(e 2) opac (c 2) l(opac (c 2)) apac(e 2) l(apac(e 2)) 1 2 3 4 1-2 1-2 1 1 2-3 2-4 1 1 1-2 1-2 1 1 1-2-3 1-2-4 2 2 23 4 5 6 2-3 2-3 2-3 2 2 2 3-4 3-5 3-6 1 1 1 1-2-3 1-2-3 1-2-3 2 2 2 1-2-3-4 1-2-3-5 1-2-3-6 3 3 3 45 6 8 2-4 2-4 2-4 3 3 3 4-5 4-6 4-8 1 1 1 1-2-4 1-2-4 1-2-4 2 2 2 1-2-4-5 1-2-4-5 1-2-4-5 3 3 3 3 4 7 3-4 2 4-7 1 1-2-3-4 3 1-2-3-4-7 4 4 56 7 9 10 4-5 4-5 4-5 4-5 2 2 2 2 5-6 5-7 5-9 5-10 1 1 1 1 1-2-4-5 1-2-4-5 1-2-4-5 1-2-4-5 3 3 3 3 1-2-4-5-6 1-2-4-5-7 1-2-4-5-9 1-2-4-5-10 4 4 4 4 67 8 10 12 4-6 4-6 4-6 4-6 2 2 2 2 6-7 6-8 6-10 6-12 1 1 1 1 1-2-4-6 1-2-4-6 1-2-4-6 1-2-4-6 3 3 3 3 1-2-4-5-7 1-2-4-5-8 1-2-4-5-10 1-2-4-5-12 4 4 4 4 45 8 4-5 2 5-8 1 1-2-3-4-5 4 1-2-3-4-8 56 9 11 4-6 4-6 2 2 6-9 6-11 1 1 1-2-3-4-6 1-2-3-4-5-6 4 5 1-2-3-4-6-9 1-2-3-4-5-6-11 5 6 78 9 10 11 14 4-7 4-7 4-7 4-7 4-7 2 2 2 2 2 7-8 7-9 7-10 7-11 7-14 1 1 1 1 1 1-2-3-4-7 1-2-3-4-7 1-2-3-4-7 1-2-3-4-7 1-2-3-4-7 4 4 4 4 4 1-2-3-4-7-8 1-2-3-4-7-9 1-2-3-4-7-10 1-2-3-4-7-11 1-2-3-4-7-14 5 5 5 5 5 89 10 12 16 11 4-8 4-8 4-8 4-8 4-8 2 2 2 2 2 8-9 8-10 8-12 8-16 8-11 1 1 1 1 1 1-2-4-8 1-2-4-8 1-2-4-8 1-2-4-81-2-3-4-8 4 4 4 4 4 1-2-4-8-9 1-2-4-8-10 1-2-4-8-12 1-2-4-8-161-2-3-4-8-11 4 4 4 4 5Fig.1. GBAPAC for 2After switching to v2, the next number in the addition chain is v3= {3, 4} where 3 and 4 are obtained either by adding 1 to 2 or doubling 2 itself respectively. Correspondingly, (w(e(v2,v3)=1)) It is shown in fig. 2.Fig.2. GBAPAC from 2Suppose the next number in the addition chain generated is v3=3, from v3 the other numbers v4= {4, 5, 6} are generated using addition or doubling steps and w(e(v3, {v4})) =1. But at the same time w(e(v2, v3)) = w(e(v2, v3)) + d+(v3)=1+3=4. It is noted that the optimal addition chain is found for every starting number at each stage. Thus, the optimal addition chain for 3 is 1-2-3, because 3 is the starting number and it has the maximum edge weight from the previous number 2. It is shown in fig. 3.Fig.3. GBAPAC from 3Fig.4. GBAPAC from 4 where the Previous Number is 2.Fig.5. GBAPAC from 4 where the Previous Number is 3On the other hand if 4 is taken as the starting number in the addition chain v3= 4 then the other numbers generated from 4 are v4 = {5, 6, 8} and they are obtained either by addition or doubling steps and (w(e(v3,{v4})) =1. But at the same time w(e(v2,v3))=w(e(v2,v4))+ d+(v3)=1+3=4. It is shown in fig. 4. If 3 and 4 is connected then v3=3 and v4 = {4, 5, 6}. Thus, w(e(v2, v3)) = e(v2, v3) + d+(v3) = 1+3=4. It is shown in fig.5. As 4 is the starting number, it is obtained in two different ways 1-2-3-4 and 1-2-4, the addition chain 1-2-4 is selected as optimum addition chain for 4 because its length is 2. But the addition chain 1-2-3-4 is not considered as the optimum addition chain even though the edge2-3 has maximum weight.Let the next number taken in the addition chain is v4=5 where 5 is obtained either from v3=3 or 4. Correspondingly the optimum addition chain for 3, 4 is 1-2-3, 1-2-4 respectively. From v4 the other numbers generated are v5= {6, 7, 8,10} or v5={6,7, 9,10} are generated using addition or doubling steps if v3=3 or 4 respectively. Then w(e(v4,{v5})) =1, w(e(v3,v4))= (e(v3,v4))+d+(v5)=1+4=5 and w(e(v2, v3)) = w(e(v2, v3))+ w(e(v3, v4))=2+4=6. As 5 is the starting number at this stage, there are two different optimal addition chains for 5 viz., 1-2-3-5 or 1-2-4-5. It is shown in fig.6 and fig.7 respectively.Let the next number taken in the addition chain is v5=6 where 6 is obtained either from v3=3 or v4=5. Correspondingly the optimum addition chain using 3, 4 is 1-2-3, 1-2-4, {1-2-3-5, 1-2-4-5} respectively. From v5the other numbers generated are v5={7, 9, 10, 12} or v5={{7, 9,10, 11,12},{7,8,10,11,12}}. They are generated using addition or doubling steps if v3=3 or v4=5 respectively. Then w(e(v5,{v6})) =1, w(e(v3,v4))=w(e(v3,v4))+4=5 if v3=3, w(e(v3, v4))= w(e(v3, v4))+w(e(v4,v5))+5, w(e(v2,v3))=w(e(v2,v3))+w(e(v3, v4)) if v4=6, as 6 is the starting number at this stage, there are two different optimal addition chain for 6 viz., 1-2-3-6 or 1-2-4-6. Further, 12 is obtained from doubling of 6, the optimal addition chain for 12 is 1-2-3-6-12 and its length is 4 which is same as the length obtained as input and hence the process is stopped. It is shown in fig.8. The other possible optimal addition chain for 12 is 1-2-4-8-12 and it is traced in similar manner. It is shown in fig.9.Fig.6. GBAPAC from 3 where the Previous Number is 2Fig.7. GBAPAC from 4 where the Previous Number is 2Fig.8. GBAPAC from 6 where the Previous Number is 3Fig.9. GBAPAC from 6 where the Previous Number is 44.2. Proposed Method 2: Graph Based Minimal Addition Chain (GBMAC)The main difference between GBAPAC and GBMAC is that, in GBMAC not all possible numbers are generated from the particular number in forming addition chain. This is because they are mutually exclusive. That is, only one number is generated by doubling step and the rest of the numbers are generated using addition step. As any one of the step is taken in generating the next number from the current number, the edge weight of current number and previous numbers is incremented by 1 where the previous numbers are numbers from which addition chain is obtained for the current number. It is noted that, the edge weight is not increasedconsiderably as in GBAPAC because all possible edges are not taken into account. From the current number either the number obtained by doubling step or any one of the number which is obtained by the addition step is taken. The process is repeated till the optimal addition chain is found.In general, let i=1; v i = 1 and v i+1 = 2. The corresponding edge weight w(e i(v i, v i+1)) =1. To move to the next number, i = i+1; v i←v i+1, v i← v i+1, where v i+1is computed as v i+1 ← {v i+v j , 1≤j≤i} , w(e i(v i, v i+1))=1or v i+1=2(vi). As v i+1 has the number which are obtained either addition or doubling steps but only one number is taken as they are mutually exclusive and hence w(e i(v i, v i-1))= w(e i(v i-1, v i))+ 1. Similar process can also be performed for other possibilities of v i+1 but the edge weight of current and previous numbers are incremented by 1. The process is repeated till it reaches n and the length of the addition chain l(n) is found. This l(n) is compared with w1 which is accepted as input and it is considered as the optimal weight. The optimal addition chain is one which has maximum edge weight between the numbers starting from 1 to n and l(n) should not exceed w1. The proposed algorithm is shown in algorithm 2.4.2.1. The working principle of GBAPAC algorithmThe working principle of the proposed GBMAC algorithm in generating the addition chain for the integer 12 is shown in Table 2. It is seen from the Table 3 that if 2 is the current number, the number 3 is obtained by addition step (2+1) and 4 is obtained from doubling step (2+2). Since they are mutually exclusive at this stage (i.e. 3 and 4 cannot be the 3rd number in any addition chain) any one of the number is taken. In this case 4 is taken as the next number. From 4, the numbers 5, 6 are obtained using addition step and 8 is obtained using doubling step. Even though 5 and 6 are obtained using addition step, they are also mutually exclusive and any one of the number is taken in the next stage for further processing. In general, only one number is considered in generating the next number w(e(vi, vj)= w(e(vi, vj)+1 where i=2,,.,j, and i≠j.Table 2. Working Principle of GBMAC4.2.2. Proposed Method 2 – An ExampleIt is noted that to generate the addition chain for n=12, the graph shown in fig.2 using GBAPAC is similar to GBMAC in generating numbers 3 and 4. As 3 and 4 are mutually exclusive, 3 and 4 are obtained by addition and doubling steps respectively from the same number. The next number chosen in addition chain is either 3 or 4.Let the next number be taken in addition chain is 3. To obtain the next numbers from 3, the numbers 4 and 5 are obtained using addition step and 6 is obtained using doubling step correspondingly the edge weight of 3-4, 3-5 and 3-6 are 1. Suppose 4 or 5 or 6 are taken as the next number from 3, the previous edge weight of 2-3 is 3. It is shown in fig. 10.。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

Graph-DTP:Graph-Based Algorithm for Solving Disjunctive Temporal
Problems
Yuechang Liu,Hong Qian and Yunfei Jiang
Software Research Institute
Sun Yat-Sen University
510275Guangzhou,P.R.China
ychangliu@,honggzb@,issjyf@
Abstract
We study an expressive quantitative temporal model: Disjunctive Temporal Problem(DTP),which wasfirst pro-posed only in1998[5].As extension of Temporal Con-straint Satisfaction Problem(TCSP)[1],DTP differs from TCSP in that two disjuncts in a same disjunctive constraint do not necessarily refer to same temporal variables.Tradi-tionally,most of the DTP algorithms in the literature solve DTPs by treating them as Constraint Satisfaction Prob-lems(CSPs),and searching for solutions using standard CSP techniques,e.g.backtracking,back-jumping,forward checking,semantic branching,removal of subsumed vari-ables,nogood recording[3,5,6],etc.
Those CSP techniques are powerful in solving DTPs. However,an evident drawback of viewing DTPs as general CSPs is that much semantic information encoded in DTPs is neglected.In fact we can mine rich semantic informa-tion that can be exploited to reduce search space for DTPs (more than semantic branching).
Through some topological analysis on the graphical rep-resentation of the problems,some techniques are developed to help to search solutions for other temporal models(e.g. TCSP),or to identify“crucial subproblems”for CSP[2]. However,little effort has been made to exploit the inherent topological information in solving DTPs.
Our idea runs on a graphical representation of DTPs–Disjunctive Temporal Network(DTN).We define DTN as an edge-labeled weighted digraph,on which some rele-vant concepts are identified.Then,we define the concept of equivalency between DTNs with respect to their consis-tency.For a given DTN,deciding its consistency is ascribed to check the consistency of a DTN which is equivalent to it and has less constraints(edges).We iteratively reduce a DTN to a simpler but equivalent one according to a set of designed reduction rules(which can be performed within polynomial time).It is hoped that when the DTN reaches afixed point under such reduction operation,the resulted DTN has minimal edges(which is like backdoor in SAT[4], or“near clique”in[2]).At last the resulted DTN(DTP)is transferred to CSP search phase,where we derive a special variable ordering strategy again through the DTN structure.
We shall describe the generation of DTN structure,the DTN reduction rules,the implementation of the complete Graph-DTP algorithm,and somefirst results of this ap-proach.
References
[1]R.Dechter,I.Meiri,and J.Pearl.Temporal constraint net-
works.Artificial Intelligence,49:61–95,1991.
[2]S.L.Epstein and R.J.Wallace.Finding crucial subproblems
to focus global search.In Proceedings of the18th IEEE In-ternational Conference on Tools with Artificial Intelligence (ICTAI-2006),pages151–162,2006.
[3] A.Oddi and A.Cesta.Incremental forward checking for the
disjunctive temporal problem.In Proceedings of ECAI2000, pages108–112,2000.
[4]S.T.T.W.P KIlby,J Slaney.Backbones and backdoors in
satisfiability.In Proceedings of the20th National conference on artificial intelligence and the17th innovative appllications of artificial intelligence conference,pages1368–1373,2005.
[5]K.Stergiou and M.Koubarakis.Backtracking algorithms for
disjunctions of temporal constraints.In Proceedings of the 15th National Conference on Artificial Intelligence(AAAI-
98),pages248–253,1998.
[6]I.Tsamardinos and M.E.Pollack.Efficient solution tech-
niques for disjunctive temporal reasoning problems.Artificial Intelligence,151(1-2):43–89,2003.
14th International Symposium on Temporal Representation and Reasoning (TIME'07
0-7695-2936-8/07 $20.00 © 2007。

相关文档
最新文档